CVE-2023-0430 – Mozilla: Revocation status of S/Mime signature certificates was not checked
https://notcve.org/view.php?id=CVE-2023-0430
Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird < 102.7.1. The Mozilla Foundation Security Advisory describes this flaw as: Certificate OCSP revocation status was not checked when verifying S/Mime signatures. • https://bugzilla.mozilla.org/show_bug.cgi?id=1769000 https://www.mozilla.org/security/advisories/mfsa2023-04 https://access.redhat.com/security/cve/CVE-2023-0430 https://bugzilla.redhat.com/show_bug.cgi?id=2166591 • CWE-295: Improper Certificate Validation CWE-299: Improper Check for Certificate Revocation •
CVE-2023-23597
https://notcve.org/view.php?id=CVE-2023-23597
A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the <code>file://</code> context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109. • https://bugzilla.mozilla.org/show_bug.cgi?id=1538028 https://www.mozilla.org/security/advisories/mfsa2023-01 • CWE-326: Inadequate Encryption Strength •
CVE-2023-23604
https://notcve.org/view.php?id=CVE-2023-23604
A duplicate <code>SystemPrincipal</code> object could be created when parsing a non-system html document via <code>DOMParser::ParseFromSafeString</code>. This could have lead to bypassing web security checks. This vulnerability affects Firefox < 109. • https://bugzilla.mozilla.org/show_bug.cgi?id=1802346 https://www.mozilla.org/security/advisories/mfsa2023-01 •
CVE-2023-23606
https://notcve.org/view.php?id=CVE-2023-23606
Memory safety bugs present in Firefox 108. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 109. • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1764974%2C1798591%2C1799201%2C1800446%2C1801248%2C1802100%2C1803393%2C1804626%2C1804971%2C1807004 https://www.mozilla.org/security/advisories/mfsa2023-01 • CWE-787: Out-of-bounds Write •
CVE-2023-23599 – Mozilla: Malicious command could be hidden in devtools output
https://notcve.org/view.php?id=CVE-2023-23599
When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. The Mozilla Foundation Security Advisory describes this flaw as: When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. • https://bugzilla.mozilla.org/show_bug.cgi?id=1777800 https://www.mozilla.org/security/advisories/mfsa2023-01 https://www.mozilla.org/security/advisories/mfsa2023-02 https://www.mozilla.org/security/advisories/mfsa2023-03 https://access.redhat.com/security/cve/CVE-2023-23599 https://bugzilla.redhat.com/show_bug.cgi?id=2162339 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-116: Improper Encoding or Escaping of Output •