The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:128.12.0+build1-0ubuntu0.22.04.1", "binary_name": "thunderbird" }, { "binary_version": "1:128.12.0+build1-0ubuntu0.22.04.1", "binary_name": "thunderbird-dev" }, { "binary_version": "1:128.12.0+build1-0ubuntu0.22.04.1", "binary_name": "thunderbird-gnome-support" }, { "binary_version": "1:128.12.0+build1-0ubuntu0.22.04.1", "binary_name": "thunderbird-mozsymbols" }, { "binary_version": "1:128.12.0+build1-0ubuntu0.22.04.1", "binary_name": "xul-ext-calendar-timezones" }, { "binary_version": "1:128.12.0+build1-0ubuntu0.22.04.1", "binary_name": "xul-ext-gdata-provider" }, { "binary_version": "1:128.12.0+build1-0ubuntu0.22.04.1", "binary_name": "xul-ext-lightning" } ] }