Description
An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.<br>*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6.
References (6)
Core 6
Core References
Issue Tracking, Permissions Required, Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1799156
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2022-51/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2022-52/
Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2022-53/
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202305-06
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202305-13
Scores
CVSS v3
8.6
EPSS
0.0040
EPSS Percentile
60.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (3)
mozilla/firefox
< 108.0
mozilla/firefox_esr
< 102.6
mozilla/thunderbird
< 102.6
Published
Dec 22, 2022
Tracked Since
Feb 18, 2026