Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1864385 | issue tracking exploit |
https://www.mozilla.org/security/advisories/mfsa2024-05/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2024-06/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2024-07/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html | third party advisory |
https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html | third party advisory |