CVE-2022-1802

Summary

CVECVE-2022-1802
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-12-22 20:15:00 UTC
Updated2022-12-29 16:39:00 UTC
DescriptionIf an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.

Risk And Classification

Problem Types: CWE-1321

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Google Android - All All All
Application Mozilla Firefox All All All All
Application Mozilla Firefox Esr All All All All
Application Mozilla Thunderbird All All All All

References

ReferenceSourceLinkTags
Security Vulnerabilities fixed in Firefox 100.0.2, Firefox for Android 100.3.0, Firefox ESR 91.9.1, Thunderbird 91.9.1 — Mozilla MISC www.mozilla.org
Access Denied MISC bugzilla.mozilla.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 159855 Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-4730)
  • 159861 Oracle Enterprise Linux Security Update for firefox (ELSA-2022-4729)
  • 159865 Oracle Enterprise Linux Security Update for firefox (ELSA-2022-4776)
  • 159866 Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-4769)
  • 159934 Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-4772)
  • 159946 Oracle Enterprise Linux Security Update for firefox (ELSA-2022-4765)
  • 179304 Debian Security Update for firefox-esr (DSA 5143-1)
  • 179311 Debian Security Update for firefox-esr (DLA 3021-1)
  • 179351 Debian Security Update for thunderbird (DLA 3041-1)
  • 179354 Debian Security Update for thunderbird (DSA 5158-1)
  • 182195 Debian Security Update for firefox-esrthunderbird (CVE-2022-1802)
  • 198795 Ubuntu Security Notification for Firefox Vulnerabilities (USN-5434-1)
  • 198797 Ubuntu Security Notification for Thunderbird Vulnerabilities (USN-5435-1)
  • 240360 Red Hat Update for firefox (RHSA-2022:4729)
  • 240361 Red Hat Update for thunderbird (RHSA-2022:4730)
  • 240362 Red Hat Update for thunderbird (RHSA-2022:4773)
  • 240366 Red Hat Update for thunderbird (RHSA-2022:4774)
  • 240367 Red Hat Update for firefox (RHSA-2022:4768)
  • 240368 Red Hat Update for thunderbird (RHSA-2022:4772)
  • 240369 Red Hat Update for firefox (RHSA-2022:4776)
  • 240370 Red Hat Update for firefox (RHSA-2022:4765)
  • 240371 Red Hat Update for firefox (RHSA-2022:4766)
  • 240372 Red Hat Update for thunderbird (RHSA-2022:4769)
  • 353945 Amazon Linux Security Advisory for thunderbird : ALAS2-2022-1804
  • 376625 Mozilla Firefox Multiple Vulnerabilities (MFSA2022-19)
  • 376626 Mozilla Firefox ESR Multiple Vulnerabilities (MFSA2022-19)
  • 502078 Alpine Linux Security Update for firefox-esr
  • 502390 Alpine Linux Security Update for thunderbird
  • 502685 Alpine Linux Security Update for firefox
  • 630853 Firefox For Android Prototype Pollution Vulnerability
  • 710582 Gentoo Linux Mozilla Firefox Multiple Vulnerabilities (GLSA 202208-08)
  • 710585 Gentoo Linux Mozilla Thunderbird Multiple Vulnerabilities (GLSA 202208-14)
  • 752167 SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2022:1818-1)
  • 752168 SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2022:1808-1)
  • 752170 SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2022:1830-1)
  • 753109 SUSE Enterprise Linux Security Update for MozillaThunderbird (SUSE-SU-2022:2062-1)
  • 940581 AlmaLinux Security Update for thunderbird (ALSA-2022:4769)
  • 940585 AlmaLinux Security Update for firefox (ALSA-2022:4776)
  • 960150 Rocky Linux Security Update for thunderbird (RLSA-2022:4769)
  • 960151 Rocky Linux Security Update for firefox (RLSA-2022:4776)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report