Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1864385 | Exploit Issue Tracking |
https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2024-05/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2024-06/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2024-07/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1864385 | Exploit Issue Tracking |
https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2024-05/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2024-06/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2024-07/ | Vendor Advisory |
Configurations
History
02 Apr 2025, 20:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian
Mozilla firefox Mozilla Mozilla thunderbird Debian debian Linux |
|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* |
|
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1864385 - Exploit, Issue Tracking | |
References | () https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html - Third Party Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2024-05/ - Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2024-06/ - Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2024-07/ - Vendor Advisory |
21 Nov 2024, 08:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1864385 - | |
References | () https://lists.debian.org/debian-lts-announce/2024/03/msg00000.html - | |
References | () https://lists.debian.org/debian-lts-announce/2024/03/msg00001.html - | |
References | () https://www.mozilla.org/security/advisories/mfsa2024-05/ - | |
References | () https://www.mozilla.org/security/advisories/mfsa2024-06/ - | |
References | () https://www.mozilla.org/security/advisories/mfsa2024-07/ - |
19 Nov 2024, 22:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CWE | CWE-565 |
04 Mar 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Feb 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8. |
20 Feb 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-20 14:15
Updated : 2025-04-02 20:12
NVD link : CVE-2024-1551
Mitre link : CVE-2024-1551
CVE.ORG link : CVE-2024-1551
JSON object : View
Products Affected
debian
- debian_linux
mozilla
- thunderbird
- firefox
CWE
CWE-565
Reliance on Cookies without Validation and Integrity Checking