// For flags

CVE-2024-1554

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.

La API `fetch()` y la navegación compartían incorrectamente el mismo caché, ya que la clave de caché no incluía los encabezados opcionales que `fetch()` puede contener. En las circunstancias correctas, un atacante podría haber podido envenenar el caché del navegador local preparándolo con una respuesta `fetch()` controlada por los encabezados adicionales. Al navegar a la misma URL, el usuario vería la respuesta almacenada en caché en lugar de la respuesta esperada. Esta vulnerabilidad afecta a Firefox &lt; 123.

*Credits: scarlet
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-02-15 CVE Reserved
  • 2024-02-20 CVE Published
  • 2024-02-21 EPSS Updated
  • 2024-08-20 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-345: Insufficient Verification of Data Authenticity
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
---- -