First published: Tue Apr 15 2025(Updated: )
Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <137.0.2 | |
Thunderbird | <128.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2359793 is categorized as high due to the potential for remote exploitation.
To fix REDHAT-BUG-2359793, update Thunderbird to the latest version beyond 137.0.2 or 128.9.2.
REDHAT-BUG-2359793 affects Mozilla Thunderbird versions up to 137.0.2 and 128.9.2.
Currently, the recommended workaround for REDHAT-BUG-2359793 is to disable the handling of external attachments.
REDHAT-BUG-2359793 is a remote code execution vulnerability related to external attachment handling in Thunderbird.