Show plain JSON{"acknowledgement": "Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Luan Herrera as the original reporter.", "affected_release": [{"advisory": "RHSA-2023:1333", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "firefox-0:102.9.0-3.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-03-20T00:00:00Z"}, {"advisory": "RHSA-2023:1401", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "thunderbird-0:102.9.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1336", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:102.9.0-3.el8_7", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-03-20T00:00:00Z"}, {"advisory": "RHSA-2023:1403", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:102.9.0-1.el8_7", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1442", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "thunderbird-0:102.9.0-2.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1479", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "firefox-0:102.9.0-4.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-03-27T00:00:00Z"}, {"advisory": "RHSA-2023:1443", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "thunderbird-0:102.9.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1445", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:102.9.0-4.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1443", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "thunderbird-0:102.9.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1445", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "firefox-0:102.9.0-4.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1443", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "thunderbird-0:102.9.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1445", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "firefox-0:102.9.0-4.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1444", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "firefox-0:102.9.0-4.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1472", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "thunderbird-0:102.9.0-2.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-03-27T00:00:00Z"}, {"advisory": "RHSA-2023:1367", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "firefox-0:102.9.0-3.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-03-21T00:00:00Z"}, {"advisory": "RHSA-2023:1404", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "thunderbird-0:102.9.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1337", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:102.9.0-3.el9_1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-03-20T00:00:00Z"}, {"advisory": "RHSA-2023:1407", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:102.9.0-1.el9_1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1364", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "firefox-0:102.9.0-3.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-03-21T00:00:00Z"}, {"advisory": "RHSA-2023:1402", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "thunderbird-0:102.9.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-03-22T00:00:00Z"}], "bugzilla": {"description": "Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation", "id": "2178470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178470"}, "csaw": false, "cvss3": {"cvss3_base_score": "6.1", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "status": "verified"}, "cwe": "CWE-829", "details": ["Dragging a URL from a cross-origin iframe that was removed during the drag could have led to user confusion and website spoofing attacks. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.", "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory described the issue of dragging a URL from a cross-origin iframe that was removed during the drag could have led to user confusion and website spoofing attacks."], "name": "CVE-2023-28164", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2023-03-14T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-28164\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-28164\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-10/#CVE-2023-28164\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-11/#CVE-2023-28164"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Moderate"}