CVE-2018-5114

If an existing cookie is changed to be "HttpOnly" while a document is open, the original value remains accessible through script until that document is closed. Network requests correctly use the changed HttpOnly cookie. This vulnerability affects Firefox < 58.
References
Link Resource
http://www.securityfocus.com/bid/102786 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040270 Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=1421324 Issue Tracking Permissions Required
https://usn.ubuntu.com/3544-1/ Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2018-02/ Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-06-11 21:29

Updated : 2024-02-28 16:25


NVD link : CVE-2018-5114

Mitre link : CVE-2018-5114

CVE.ORG link : CVE-2018-5114


JSON object : View

Products Affected

mozilla

  • firefox

canonical

  • ubuntu_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor