{"api_version":"1","generated_at":"2026-04-23T07:56:04+00:00","cve":"CVE-2022-3032","urls":{"html":"https://cve.report/CVE-2022-3032","api":"https://cve.report/api/cve/CVE-2022-3032.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3032","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3032"},"summary":{"title":"CVE-2022-3032","description":"When receiving an HTML email that contained an <code>iframe</code> element, which used a <code>srcdoc</code> attribute to define the inner HTML document, remote objects specified in the nested document, for example images or videos, were not blocked. Rather, the network was accessed, the objects were loaded and displayed. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1.","state":"PUBLIC","assigner":"security@mozilla.org","published_at":"2022-12-22 20:15:00","updated_at":"2023-08-08 14:22:00"},"problem_types":["CWE-610"],"metrics":[],"references":[{"url":"https://www.mozilla.org/security/advisories/mfsa2022-38/","name":"https://www.mozilla.org/security/advisories/mfsa2022-38/","refsource":"MISC","tags":[],"title":"Security Vulnerabilities fixed in Thunderbird 102.2.1 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mozilla.org/security/advisories/mfsa2022-39/","name":"https://www.mozilla.org/security/advisories/mfsa2022-39/","refsource":"MISC","tags":[],"title":"Security Vulnerabilities fixed in Thunderbird 91.13.1 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1783831","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1783831","refsource":"MISC","tags":[],"title":"Access Denied","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3032","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3032","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"3032","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-3032","qid":"160114","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-6708)"},{"cve":"CVE-2022-3032","qid":"160116","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-6717)"},{"cve":"CVE-2022-3032","qid":"160176","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-6710)"},{"cve":"CVE-2022-3032","qid":"182221","title":"Debian Security Update for thunderbird (CVE-2022-3032)"},{"cve":"CVE-2022-3032","qid":"198977","title":"Ubuntu Security Notification for Thunderbird Vulnerabilities (USN-5663-1)"},{"cve":"CVE-2022-3032","qid":"240687","title":"Red Hat Update for thunderbird (RHSA-2022:6708)"},{"cve":"CVE-2022-3032","qid":"240688","title":"Red Hat Update for thunderbird (RHSA-2022:6713)"},{"cve":"CVE-2022-3032","qid":"240691","title":"Red Hat Update for thunderbird (RHSA-2022:6717)"},{"cve":"CVE-2022-3032","qid":"240693","title":"Red Hat Update for thunderbird (RHSA-2022:6710)"},{"cve":"CVE-2022-3032","qid":"240694","title":"Red Hat Update for thunderbird (RHSA-2022:6715)"},{"cve":"CVE-2022-3032","qid":"296086","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 51.132.1 Missing (CPUOCT2022)"},{"cve":"CVE-2022-3032","qid":"354131","title":"Amazon Linux Security Advisory for thunderbird : ALAS2-2022-1900"},{"cve":"CVE-2022-3032","qid":"376963","title":"Mozilla Thunderbird Multiple Vulnerabilities (MFSA2022-38)"},{"cve":"CVE-2022-3032","qid":"377598","title":"Mozilla Thunderbird Multiple Vulnerabilities (MFSA2022-39)"},{"cve":"CVE-2022-3032","qid":"753189","title":"SUSE Enterprise Linux Security Update for MozillaThunderbird (SUSE-SU-2022:3281-1)"},{"cve":"CVE-2022-3032","qid":"940676","title":"AlmaLinux Security Update for thunderbird (ALSA-2022:6708)"},{"cve":"CVE-2022-3032","qid":"940694","title":"AlmaLinux Security Update for thunderbird (ALSA-2022:6717)"},{"cve":"CVE-2022-3032","qid":"960388","title":"Rocky Linux Security Update for thunderbird (RLSA-2022:6708)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-3032","ASSIGNER":"security@mozilla.org","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Mozilla","product":{"product_data":[{"product_name":"Thunderbird","version":{"version_data":[{"version_value":"102.2.1","version_affected":"<"},{"version_value":"91.13.1","version_affected":"<"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked"}]}]},"references":{"reference_data":[{"url":"https://www.mozilla.org/security/advisories/mfsa2022-38/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2022-38/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2022-39/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2022-39/"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1783831","refsource":"MISC","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1783831"}]},"description":{"description_data":[{"lang":"eng","value":"When receiving an HTML email that contained an <code>iframe</code> element, which used a <code>srcdoc</code> attribute to define the inner HTML document, remote objects specified in the nested document, for example images or videos, were not blocked. Rather, the network was accessed, the objects were loaded and displayed. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1."}]}},"nvd":{"publishedDate":"2022-12-22 20:15:00","lastModifiedDate":"2023-08-08 14:22:00","problem_types":["CWE-610"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionStartIncluding":"102.0","versionEndExcluding":"102.2.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionEndExcluding":"91.13.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}