CVE-2022-1529

Name
CVE-2022-1529
Description
An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://bugzilla.mozilla.org/show_bug.cgi?id=1770048
MISC https://www.mozilla.org/security/advisories/mfsa2022-19/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* thunderbird >= None < 91.9.1
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* firefox_esr >= None < 91.9.1
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* firefox >= None < 100.0.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
firefox-esr 3.15-community 91.9.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed