First published: Tue Feb 04 2025(Updated: )
The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7.
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <128.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2343759 is considered high due to the potential for malicious payloads in exported address books.
To fix REDHAT-BUG-2343759, update Mozilla Thunderbird to version 128.8 or later, which addresses the unsanitized link vulnerability.
Users of Mozilla Thunderbird versions up to 128.7 are affected by REDHAT-BUG-2343759 and should take action to secure their software.
REDHAT-BUG-2343759 is a vulnerability related to unsanitized input in the Address Book URI fields, allowing for the inclusion of malicious payloads.
Yes, importing an address book containing a payload due to REDHAT-BUG-2343759 can potentially compromise your system.