Reliance on Cookies without Validation and Integrity Checking Affecting Firefox package, versions [,123)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-FIREFOX-6276595
  • published26 Feb 2024
  • disclosed20 Feb 2024
  • creditscarlet

Introduced: 20 Feb 2024

CVE-2024-1554  (opens in a new tab)
CWE-565  (opens in a new tab)

How to fix?

Upgrade Firefox to version 123 or higher.

Overview

Affected versions of this package are vulnerable to Reliance on Cookies without Validation and Integrity Checking due to the cache key not including the optional headers that fetch() may contain. An attacker can poison the local browser cache by priming it with a fetch() response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response.

CVSS Scores

version 3.1