Overview
Mozilla Thunderbird does not adequately restrict HTML elements in email content, which could allow an attacker to execute arbitrary script when a specially-crafted email message is forwarded or replied to.
Description
Vulnerability Lab has reported a vulnerability in the way Mozilla Thunderbird handles HTML elements in email content. Mozilla Thunderbird blocks the creation of certain HTML elements, such as script, when displaying email messages. Traditionally, a script element is created through the use of a <script> HTML tag. HTML elements, including script, can also be created through the use of an <object> tag that specifies a Data URI scheme (RFC 2397). The Data URI can specify a text/html mime type and encode the script in base64. In such cases, Thunderbird will execute the script contained in the email message when it is forwarded or replied to and the outgoing message is in HTML format. Simply displaying the email message does not appear to cause the script to execute. See Mozilla Bug Bounty #5 - WireTap Remote Web Vulnerability for more details. |
Impact
By creating a specially-crafted email message, an attacker can cause arbitrary script to execute in Thunderbird when that message is forwarded or replied to. |
Solution
Apply an update |
Compose email in plain text format |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 5 | AV:N/AC:L/Au:N/C:N/I:P/A:N |
Temporal | 3.9 | E:POC/RL:OF/RC:C |
Environmental | 2.9 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
This vulnerability was reported by Vulnerability Laboratory, who in turn credits Ateeq ur Rehman Khan.
This document was written by Art Manion and Will Dormann.
Other Information
CVE IDs: | CVE-2013-6674 |
Date Public: | 2014-01-27 |
Date First Published: | 2014-01-27 |
Date Last Updated: | 2014-01-28 22:46 UTC |
Document Revision: | 26 |