CVE-2024-1554

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*

History

02 Apr 2025, 20:12

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
First Time Mozilla
Mozilla firefox
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1816390 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1816390 - Exploit, Issue Tracking
References () https://www.mozilla.org/security/advisories/mfsa2024-05/ - () https://www.mozilla.org/security/advisories/mfsa2024-05/ - Vendor Advisory

Information

Published : 2024-02-20 14:15

Updated : 2025-04-02 20:12


NVD link : CVE-2024-1554

Mitre link : CVE-2024-1554

CVE.ORG link : CVE-2024-1554


JSON object : View

Products Affected

mozilla

  • firefox
CWE
CWE-345

Insufficient Verification of Data Authenticity