The constructed curl command from the "Copy as curl" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.<br>*This bug only affects Thunderbird for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
References
Link | Resource |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-02/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-01/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-03/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1737252 | Issue Tracking |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-12-22 12:15
Updated : 2022-12-29 12:05
NVD link : CVE-2022-22744
Mitre link : CVE-2022-22744
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
mozilla
- firefox
- firefox_esr
- thunderbird
microsoft
- windows