Bug 2359793 (CVE-2025-3522)
Summary: | CVE-2025-3522 thunderbird: Leak of hashed Window credentials via crafted attachment URL | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | erack, gotiwari, jhorak, mvyas, tpopela |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | --- | |
Doc Text: |
A flaw was found in Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
OSIDB Bzimport
2025-04-15 16:01:40 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:4229 https://access.redhat.com/errata/RHSA-2025:4229 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2025:4389 https://access.redhat.com/errata/RHSA-2025:4389 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:4513 https://access.redhat.com/errata/RHSA-2025:4513 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:4512 https://access.redhat.com/errata/RHSA-2025:4512 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:4514 https://access.redhat.com/errata/RHSA-2025:4514 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2025:4617 https://access.redhat.com/errata/RHSA-2025:4617 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:4649 https://access.redhat.com/errata/RHSA-2025:4649 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2025:4654 https://access.redhat.com/errata/RHSA-2025:4654 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:4665 https://access.redhat.com/errata/RHSA-2025:4665 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7435 https://access.redhat.com/errata/RHSA-2025:7435 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:7507 https://access.redhat.com/errata/RHSA-2025:7507 |