Lucene search

K
redhatcveRedhat.comRH:CVE-2024-7524
HistoryAug 07, 2024 - 4:08 p.m.

CVE-2024-7524

2024-08-0716:08:44
redhat.com
access.redhat.com
7
firefox
vulnerability
csp strict-dynamic
dom clobbering
xss
tracking scripts
enhanced tracking protection
cve-2024-7524
web-compatibility.

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

9.1

Confidence

High

EPSS

0.001

Percentile

21.9%

The Mozilla Foundation Security Advisory describes this flaw as: Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in “strict-dynamic” mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection.

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

9.1

Confidence

High

EPSS

0.001

Percentile

21.9%