Rapid7 Vulnerability & Exploit Database

MFSA2012-56 Thunderbird: Code execution through javascript: URLs (CVE-2012-1967)

Back to Search

MFSA2012-56 Thunderbird: Code execution through javascript: URLs (CVE-2012-1967)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
07/18/2012
Created
07/25/2018
Added
08/04/2012
Modified
05/09/2019

Description

Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly implement the JavaScript sandbox utility, which allows remote attackers to execute arbitrary JavaScript code with improper privileges via a javascript: URL.

Solution(s)

  • mozilla-thunderbird-esr-upgrade-10_0_6
  • mozilla-thunderbird-upgrade-14_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;