First published: Tue Apr 15 2025(Updated: )
By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <137.0.2 | |
Thunderbird | <128.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2359789 is categorized as a medium risk.
To fix REDHAT-BUG-2359789, users should upgrade to the latest version of Mozilla Thunderbird that includes the necessary patch.
Users of Mozilla Thunderbird versions prior to 137.0.2 and 128.9.2 are affected by REDHAT-BUG-2359789.
REDHAT-BUG-2359789 is a file inclusion vulnerability that can expose sensitive data.
Yes, exploiting REDHAT-BUG-2359789 can potentially lead to data breaches by disclosing sensitive information from the /tmp directory.