CVE-2024-1554
CRITICALMozilla Firefox < 123.0 - Data Authenticity Bypass
Title source: ruleDescription
The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.
Scores
CVSS v3
9.8
EPSS
0.0023
EPSS Percentile
45.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-345
Status
published
Products (1)
mozilla/firefox
< 123.0
Published
Feb 20, 2024
Tracked Since
Feb 18, 2026