The constructed curl command from the "Copy as curl" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.<br>*This bug only affects Thunderbird for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-01/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-02/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-03/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1737252 | issue tracking |