CVE-2024-1554

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.
Configurations

No configuration.

History

21 Nov 2024, 08:50

Type Values Removed Values Added
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1816390 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1816390 -
References () https://www.mozilla.org/security/advisories/mfsa2024-05/ - () https://www.mozilla.org/security/advisories/mfsa2024-05/ -

20 Aug 2024, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-345

20 Feb 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-20 14:15

Updated : 2024-11-21 08:50


NVD link : CVE-2024-1554

Mitre link : CVE-2024-1554

CVE.ORG link : CVE-2024-1554


JSON object : View

Products Affected

No product.

CWE
CWE-345

Insufficient Verification of Data Authenticity