Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-1551

Опубликовано: 20 фев. 2024
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.

The Mozilla Foundation Security Advisory describes this flaw as: Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2024:095726.02.2024
Red Hat Enterprise Linux 7firefoxFixedRHSA-2024:097626.02.2024
Red Hat Enterprise Linux 8firefoxFixedRHSA-2024:095526.02.2024
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2024:096426.02.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportthunderbirdFixedRHSA-2024:095826.02.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportfirefoxFixedRHSA-2024:097226.02.2024
Red Hat Enterprise Linux 8.2 Telecommunications Update ServicethunderbirdFixedRHSA-2024:095826.02.2024
Red Hat Enterprise Linux 8.2 Telecommunications Update ServicefirefoxFixedRHSA-2024:097226.02.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-74
https://bugzilla.redhat.com/show_bug.cgi?id=2265354Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts

EPSS

Процентиль: 46%
0.00232
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 1 года назад

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.

CVSS3: 6.1
nvd
больше 1 года назад

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.

CVSS3: 6.1
debian
больше 1 года назад

Set-Cookie response headers were being incorrectly honored in multipar ...

CVSS3: 6.1
github
больше 1 года назад

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 6.1
fstec
больше 1 года назад

Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с неверной нейтрализацией особых элементов в выходных данных, используемых входящим компонентом, позволяющая нарушителю внедрить произвольные HTTP-заголовки

EPSS

Процентиль: 46%
0.00232
Низкий

6.1 Medium

CVSS3