Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-1554

Опубликовано: 20 фев. 2024
Источник: debian
EPSS Низкий

Описание

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed123.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-05/#CVE-2024-1554

EPSS

Процентиль: 38%
0.00204
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 2 года назад

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.

CVSS3: 9.8
nvd
почти 2 года назад

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.

CVSS3: 9.8
github
почти 2 года назад

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.

CVSS3: 6.5
fstec
почти 2 года назад

Уязвимость функции fetch браузера Mozilla Firefox связанная с ошибками управления ресурсом, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 38%
0.00204
Низкий