Show plain JSON{"affected_release": [{"advisory": "RHSA-2024:7702", "cpe": "cpe:/o:redhat:rhel_els:7", "package": "firefox-0:128.3.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7 Extended Lifecycle Support", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7699", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:128.3.0-1.el8_10", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7700", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:128.3.0-1.el8_10", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7646", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:128.3.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2024-10-03T00:00:00Z"}, {"advisory": "RHSA-2024:7856", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "thunderbird-0:128.3.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:7703", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "firefox-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7854", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "thunderbird-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:7703", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "firefox-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7854", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "thunderbird-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:7703", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "firefox-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7854", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "thunderbird-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:7704", "cpe": "cpe:/a:redhat:rhel_aus:8.6", "package": "firefox-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:8169", "cpe": "cpe:/a:redhat:rhel_aus:8.6", "package": "thunderbird-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support", "release_date": "2024-10-16T00:00:00Z"}, {"advisory": "RHSA-2024:7704", "cpe": "cpe:/a:redhat:rhel_tus:8.6", "package": "firefox-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:8169", "cpe": "cpe:/a:redhat:rhel_tus:8.6", "package": "thunderbird-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2024-10-16T00:00:00Z"}, {"advisory": "RHSA-2024:7704", "cpe": "cpe:/a:redhat:rhel_e4s:8.6", "package": "firefox-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:8169", "cpe": "cpe:/a:redhat:rhel_e4s:8.6", "package": "thunderbird-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2024-10-16T00:00:00Z"}, {"advisory": "RHSA-2024:7842", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "firefox-0:128.3.0-1.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:8166", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "thunderbird-0:128.3.1-1.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-10-16T00:00:00Z"}, {"advisory": "RHSA-2024:7505", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:128.3.0-1.el9_4", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-10-02T00:00:00Z"}, {"advisory": "RHSA-2024:7552", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:128.3.0-1.el9_4", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-10-02T00:00:00Z"}, {"advisory": "RHSA-2024:7621", "cpe": "cpe:/a:redhat:rhel_e4s:9.0", "package": "firefox-0:128.3.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions", "release_date": "2024-10-03T00:00:00Z"}, {"advisory": "RHSA-2024:7855", "cpe": "cpe:/a:redhat:rhel_e4s:9.0", "package": "thunderbird-0:128.3.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:7622", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "firefox-0:128.3.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2024-10-03T00:00:00Z"}, {"advisory": "RHSA-2024:7853", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "thunderbird-0:128.3.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2024-10-09T00:00:00Z"}], "bugzilla": {"description": "firefox: thunderbird: Cross-origin access to PDF contents through multipart responses", "id": "2315956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315956"}, "csaw": false, "cvss3": {"cvss3_base_score": "7.6", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "status": "verified"}, "cwe": "CWE-94", "details": ["An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://pdf.js` origin. This could allow them to access cross-origin PDF content. This access is limited to \"same site\" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Firefox ESR < 115.16, Thunderbird < 128.3, and Thunderbird < 131.", "A flaw was found in Mozilla. The Mozilla Foundation's Security Advisory describes the issue as follows: An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the resource://pdf.js origin. This could allow them to access cross-origin PDF content. This access is limited to \"same site\" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions."], "name": "CVE-2024-9393", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:10", "fix_state": "Affected", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 10"}, {"cpe": "cpe:/o:redhat:enterprise_linux:10", "fix_state": "Affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 10"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "firefox-flatpak-container", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "thunderbird-flatpak-container", "product_name": "Red Hat Enterprise Linux 9"}], "public_date": "2024-10-01T15:13:19Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2024-9393\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-9393\nhttps://www.mozilla.org/security/advisories/mfsa2024-47/\nhttps://www.mozilla.org/security/advisories/mfsa2024-48/\nhttps://www.mozilla.org/security/advisories/mfsa2024-49/\nhttps://www.mozilla.org/security/advisories/mfsa2024-50/"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Important"}