CVE-2024-1554

CRITICAL

Mozilla Firefox < 123.0 - Data Authenticity Bypass

Title source: rule
STIX 2.1

Description

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.

Scores

CVSS v3 9.8
EPSS 0.0023
EPSS Percentile 45.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-345
Status published
Products (1)
mozilla/firefox < 123.0
Published Feb 20, 2024
Tracked Since Feb 18, 2026