*Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox < 108, Thunderbird < 102.6.1, Thunderbird < 102.6, and Firefox ESR < 102.6.">
A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code.<br/>*Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox < 108, Thunderbird < 102.6.1, Thunderbird < 102.6, and Firefox ESR < 102.6.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-52/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-53/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-51/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-54/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1746139 | issue tracking permissions required |
https://security.gentoo.org/glsa/202305-06 | vendor advisory |
https://security.gentoo.org/glsa/202305-13 | vendor advisory |