CVE-2024-1551
6.1MEDIUMSet-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, the
Publicado: 2/20/2024Actualizado: 4/2/2025
Descripción
Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
Análisis IAImpulsado por IA
Productos Afectados
mozillafirefox
mozillafirefox
mozillathunderbird
debiandebian_linux
10.0
Referencias
- https://bugzilla.mozilla.org/show_bug.cgi?id=1864385ExploitIssue Tracking
- https://lists.debian.org/debian-lts-announce/2024/03/msg00000.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/03/msg00001.htmlThird Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-05/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-06/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-07/Vendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1864385ExploitIssue Tracking
- https://lists.debian.org/debian-lts-announce/2024/03/msg00000.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/03/msg00001.htmlThird Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-05/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-06/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-07/Vendor Advisory