Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-1551

Опубликовано: 20 фев. 2024
Источник: debian
EPSS Низкий

Описание

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed123.0-1package
firefox-esrfixed115.8.0esr-1package
thunderbirdfixed1:115.8.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-05/#CVE-2024-1551

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/#CVE-2024-1551

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-07/#CVE-2024-1551

EPSS

Процентиль: 46%
0.00232
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 1 года назад

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.

CVSS3: 6.1
redhat
больше 1 года назад

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.

CVSS3: 6.1
nvd
больше 1 года назад

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.

CVSS3: 6.1
github
больше 1 года назад

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 6.1
fstec
больше 1 года назад

Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с неверной нейтрализацией особых элементов в выходных данных, используемых входящим компонентом, позволяющая нарушителю внедрить произвольные HTTP-заголовки

EPSS

Процентиль: 46%
0.00232
Низкий