Show plain JSON{"affected_release": [{"advisory": "RHSA-2024:7702", "cpe": "cpe:/o:redhat:rhel_els:7", "package": "firefox-0:128.3.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7 Extended Lifecycle Support", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7699", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:128.3.0-1.el8_10", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7700", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:128.3.0-1.el8_10", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7646", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:128.3.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2024-10-03T00:00:00Z"}, {"advisory": "RHSA-2024:7856", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "thunderbird-0:128.3.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:7703", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "firefox-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7854", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "thunderbird-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:7703", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "firefox-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7854", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "thunderbird-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:7703", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "firefox-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:7854", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "thunderbird-0:128.3.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:7704", "cpe": "cpe:/a:redhat:rhel_aus:8.6", "package": "firefox-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:8169", "cpe": "cpe:/a:redhat:rhel_aus:8.6", "package": "thunderbird-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support", "release_date": "2024-10-16T00:00:00Z"}, {"advisory": "RHSA-2024:7704", "cpe": "cpe:/a:redhat:rhel_tus:8.6", "package": "firefox-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:8169", "cpe": "cpe:/a:redhat:rhel_tus:8.6", "package": "thunderbird-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2024-10-16T00:00:00Z"}, {"advisory": "RHSA-2024:7704", "cpe": "cpe:/a:redhat:rhel_e4s:8.6", "package": "firefox-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2024-10-07T00:00:00Z"}, {"advisory": "RHSA-2024:8169", "cpe": "cpe:/a:redhat:rhel_e4s:8.6", "package": "thunderbird-0:128.3.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2024-10-16T00:00:00Z"}, {"advisory": "RHSA-2024:7842", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "firefox-0:128.3.0-1.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:8166", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "thunderbird-0:128.3.1-1.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-10-16T00:00:00Z"}, {"advisory": "RHSA-2024:7552", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:128.3.0-1.el9_4", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-10-02T00:00:00Z"}, {"advisory": "RHSA-2024:7621", "cpe": "cpe:/a:redhat:rhel_e4s:9.0", "package": "firefox-0:128.3.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions", "release_date": "2024-10-03T00:00:00Z"}, {"advisory": "RHSA-2024:7855", "cpe": "cpe:/a:redhat:rhel_e4s:9.0", "package": "thunderbird-0:128.3.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions", "release_date": "2024-10-09T00:00:00Z"}, {"advisory": "RHSA-2024:7622", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "firefox-0:128.3.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2024-10-03T00:00:00Z"}, {"advisory": "RHSA-2024:7853", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "thunderbird-0:128.3.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2024-10-09T00:00:00Z"}], "bugzilla": {"description": "firefox: thunderbird: External protocol handlers could be enumerated via popups", "id": "2315952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315952"}, "csaw": false, "cvss3": {"cvss3_base_score": "4.3", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "status": "verified"}, "cwe": "CWE-203", "details": ["By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.", "The Mozilla Foundation's Security Advisory: By checking the result of calls to window.open with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed."], "name": "CVE-2024-9398", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "firefox-flatpak-container", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "thunderbird-flatpak-container", "product_name": "Red Hat Enterprise Linux 9"}], "public_date": "2024-10-01T15:13:20Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2024-9398\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-9398\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1881037\nhttps://www.mozilla.org/security/advisories/mfsa2024-46/\nhttps://www.mozilla.org/security/advisories/mfsa2024-47/\nhttps://www.mozilla.org/security/advisories/mfsa2024-49/\nhttps://www.mozilla.org/security/advisories/mfsa2024-50/"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Low"}