CVE-2021-38497

NameCVE-2021-38497
DescriptionThrough use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid126.0.1-1fixed
firefox-esr (PTS)buster91.12.0esr-1~deb10u1fixed
buster (security)115.11.0esr-1~deb10u1fixed
bullseye115.7.0esr-1~deb11u1fixed
bullseye (security)115.11.0esr-1~deb11u1fixed
bookworm115.7.0esr-1~deb12u1fixed
bookworm (security)115.11.0esr-1~deb12u1fixed
sid, trixie115.11.0esr-1fixed
thunderbird (PTS)buster1:91.12.0-1~deb10u1fixed
buster (security)1:115.11.0-1~deb10u1fixed
bullseye1:115.7.0-1~deb11u1fixed
bullseye (security)1:115.11.0-1~deb11u1fixed
bookworm1:115.7.0-1~deb12u1fixed
bookworm (security)1:115.11.0-1~deb12u1fixed
sid, trixie1:115.11.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)93.0-1
firefox-esrsource(unstable)(not affected)
thunderbirdsource(unstable)(not affected)

Notes

- firefox-esr <not-affected> (Only affect Firefox 91 not in any supported suite in vulnerable version)
- thunderbird <not-affected> (Only affects Thunderbird 91 not in any supported suite in vulnerable version)
https://www.mozilla.org/en-US/security/advisories/mfsa2021-43/#CVE-2021-38497
https://www.mozilla.org/en-US/security/advisories/mfsa2021-45/#CVE-2021-38497
https://www.mozilla.org/en-US/security/advisories/mfsa2021-47/#CVE-2021-38497

Search for package or bug name: Reporting problems