By checking the result of calls to window.open with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-9398.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "131.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "128.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "128.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "129.0-beta"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "129.0-beta2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "129.0-beta3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "129.0-beta4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "129.0-beta5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "129.0-beta6"
}
]
}
]