When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2023-02/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2023-01/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2023-03/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1777800 | vendor advisory issue tracking permissions required |