Rapid7 Vulnerability & Exploit Database

MFSA2008-59 Thunderbird: Script access to .documentURI and .textContent in mail

Back to Search

MFSA2008-59 Thunderbird: Script access to .documentURI and .textContent in mail

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
11/19/2008
Created
07/25/2018
Added
11/21/2013
Modified
01/30/2015

Description

Mozilla developer reported that a malicious mail message might be able to glean personal information about the recipient from the mailbox URI (such as computer account name) if the mail recipient has enabled JavaScript in mail. If a malicious mail is forwarded "in-line" to a recipient who has enabled JavaScript, then comments added by the forwarder could be accessed by scripts in the message and potentially revealed to the original malicious author if that message has also been allowed to load remote content.Scripts in mail messages no longer have access to the DOM properties and .Thunderbird is only vulnerable to this issue if JavaScript is enabled in mail. This is not the default setting and we strongly discourage users from running JavaScript in mail.

Solution(s)

  • mozilla-thunderbird-upgrade-2_0_0_18

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;