CVE-2021-38503

10.0 CRITICAL

📋 TL;DR

This vulnerability allows malicious iframes to bypass sandbox restrictions when loading XSLT stylesheets, enabling script execution and top-level frame navigation that should be blocked. It affects Firefox browsers, Thunderbird email clients, and Firefox ESR versions before specific security updates. Users of outdated Mozilla products are vulnerable to web-based attacks.

💻 Affected Systems

Products:
  • Firefox
  • Thunderbird
  • Firefox ESR
Versions: Firefox < 94, Thunderbird < 91.3, Firefox ESR < 91.3
Operating Systems: All platforms running affected versions
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special settings required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete browser compromise allowing arbitrary code execution, data theft, and full system access through chained exploits.

🟠

Likely Case

Cross-site scripting attacks, session hijacking, and malicious redirects from compromised websites.

🟢

If Mitigated

Limited impact with proper network segmentation and application whitelisting, though browser compromise still possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to visit malicious website but no authentication needed. Weaponization likely due to CVSS 10.0 rating and browser attack surface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 94+, Thunderbird 91.3+, Firefox ESR 91.3+

Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1729517

Restart Required: Yes

Instructions:

1. Open browser/email client. 2. Go to settings/about. 3. Allow automatic update or manually download latest version from Mozilla. 4. Restart application after update.

🔧 Temporary Workarounds

Disable JavaScript in iframes

all

Configure browser to block JavaScript execution in iframes via about:config settings

about:config
Set javascript.enabled to false

Use NoScript extension

all

Install NoScript to block XSLT and script execution selectively

🧯 If You Can't Patch

  • Block access to untrusted websites using web proxy or firewall rules
  • Implement application control to restrict browser usage to essential sites only

🔍 How to Verify

Check if Vulnerable:

Check browser version in settings/about menu and compare to affected versions

Check Version:

firefox --version (Linux) or check Help > About (Windows/Mac)

Verify Fix Applied:

Confirm version is Firefox 94+, Thunderbird 91.3+, or Firefox ESR 91.3+

📡 Detection & Monitoring

Log Indicators:

  • Multiple iframe load failures
  • XSLT processing errors in browser logs
  • Unexpected top-level navigation events

Network Indicators:

  • Unusual XSLT file downloads
  • Multiple redirects from single page loads

SIEM Query:

source="browser_logs" AND (event="iframe_sandbox_violation" OR event="xslt_execution")

🔗 References

📤 Share & Export