Unprotected URI Links in Thunderbird Address Book by Mozilla
CVE-2025-1015
Key Information:
- Vendor
- Mozilla
- Status
- Vendor
- CVE Published:
- 4 February 2025
Badges
What is CVE-2025-1015?
CVE-2025-1015 is a vulnerability found in the Thunderbird Address Book, a feature of the open-source email client developed by Mozilla. The purpose of Thunderbird is to provide users with a robust email management solution, which includes the ability to manage contacts efficiently through its Address Book. This vulnerability arises from the presence of unsanitized URI links in the Address Book fields, particularly in the Instant Messaging section. If an attacker creates an address book with malicious links and a victim imports it, the victim may inadvertently execute scripts within Thunderbird, leading to various potential threats against the organization.
Technical Details
The vulnerability exists in versions of Thunderbird prior to 128.7, where the URI fields were not properly sanitized. This flaw allows the insertion of untrusted links that, if imported and clicked by a user, could navigate to a malicious web page through Thunderbird's interface. The page can then trigger JavaScript execution within a user's session, albeit with unprivileged access. Without adequate sanitization, this creates a pathway for attackers to potentially exploit user actions and access sensitive information.
Potential Impact of CVE-2025-1015
-
Execution of Malicious Scripts: The ability for attackers to execute JavaScript within the Thunderbird environment can lead to the exploitation of user sessions, which may then be leveraged to exfiltrate data or execute unauthorized actions.
-
Phishing Attacks: Since the exploit allows for the delivery of malicious links that could lead to phishing sites, it raises significant concerns regarding the potential for credential theft and unauthorized access to sensitive accounts.
-
Spread of Malware: The vulnerability could serve as a vector for spreading malware if users are tricked into visiting compromised web pages or downloading malicious content, nullifying organizational defenses and leading to broader security breaches.
Affected Version(s)
Thunderbird < 128.7
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved