CVE-2020-26955Reliance on Cookies without Validation and Integrity Checking in Mozilla Firefox

Severity
6.5MEDIUMNVD
EPSS
0.3%
top 48.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9
Latest updateMay 24

Description

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5mozilla/firefox< 83
NVDmozilla/firefox< 83.0
mozillamozilla/firefox

🔴Vulnerability Details

2
GHSA
GHSA-xvpg-g5h6-mqww: When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on th2022-05-24
OSV
CVE-2020-26955: When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on th2020-12-09

📋Vendor Advisories

2
Debian
CVE-2020-26955: firefox - When a user downloaded a file in Firefox for Android, if a cookie is set, it wou...2020
Mozilla
Mozilla Foundation Security Advisory 2020-50: CVE-2020-26955