CVE-2022-29911
Mozilla: iframe Sandbox bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An improper implementation of the new iframe sandbox keyword <code>allow-top-navigation-by-user-activation</code> could lead to script execution without <code>allow-scripts</code> being present. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
Una implementación incorrecta de la nueva palabra clave de iframe sandbox <code>allow-top-navigation-by-user-activation</code> podría provocar la ejecución del script sin que <code>allow-scripts</code> esté presente. Esta vulnerabilidad afecta a Thunderbird < 91.9, Firefox ESR < 91.9 y Firefox < 100.
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of Firefox not protecting against top-level navigations for an iframe sandbox with a policy relaxed through a keyword likely to allow top-navigation-by-user-activation.
An update that fixes 8 vulnerabilities is now available. This update for MozillaThunderbird fixes the following issues. Various security fixes MFSA 2022-18. Incorrect security status shown after viewing an attached email. Fullscreen notification bypass using popups. Bypassing permission prompt in nested browsing contexts. Leaking browser history with CSS variables. Iframe sandbox bypass. Reader mode bypassed SameSite cookies. Speech Synthesis feature not properly disabled. Memory safety bugs fixed in Thunderbird 91.9.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2022-04-29 CVE Reserved
- 2022-05-04 CVE Published
- 2025-04-16 CVE Updated
- 2025-08-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-1021: Improper Restriction of Rendered UI Layers or Frames
CAPEC
References (5)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.mozilla.org/security/advisories/mfsa2022-16 | 2023-01-04 | |
https://www.mozilla.org/security/advisories/mfsa2022-17 | 2023-01-04 | |
https://www.mozilla.org/security/advisories/mfsa2022-18 | 2023-01-04 | |
https://access.redhat.com/security/cve/CVE-2022-29911 | 2022-05-18 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2081471 | 2022-05-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | < 100.0 Search vendor "Mozilla" for product "Firefox" and version " < 100.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | < 91.9 Search vendor "Mozilla" for product "Firefox Esr" and version " < 91.9" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Thunderbird Search vendor "Mozilla" for product "Thunderbird" | < 91.9 Search vendor "Mozilla" for product "Thunderbird" and version " < 91.9" | - |
Affected
|