{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-3155","assignerOrgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","assignerShortName":"mozilla","dateUpdated":"2025-04-15T15:58:52.277Z","dateReserved":"2022-09-07T00:00:00.000Z","datePublished":"2022-12-22T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","shortName":"mozilla","dateUpdated":"2022-12-22T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"When saving or opening an email attachment on macOS, Thunderbird did not set attribute com.apple.quarantine on the received file. If the received file was an application and the user attempted to open it, then the application was started immediately without asking the user to confirm. This vulnerability affects Thunderbird < 102.3."}],"affected":[{"vendor":"Mozilla","product":"Thunderbird","versions":[{"version":"unspecified","lessThan":"102.3","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://www.mozilla.org/security/advisories/mfsa2022-42/"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1789061"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Attachment files saved to disk on macOS could be executed without warning"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:00:10.866Z"},"title":"CVE Program Container","references":[{"url":"https://www.mozilla.org/security/advisories/mfsa2022-42/","tags":["x_transferred"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1789061","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-276","lang":"en","description":"CWE-276 Incorrect Default Permissions"}]}],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1789061","tags":["exploit"]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-15T15:58:46.000822Z","id":"CVE-2022-3155","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T15:58:52.277Z"}}]}}