CVE-2024-11697 — Code Injection in Mozilla Firefox
CWE-94 — Code InjectionCWE-356 — Product UI does not Warn User of Unsafe Actions12 documents8 sources
Severity
8.8HIGHNVD
OSV4.3
EPSS
0.1%
top 77.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 26
Latest updateDec 3
Description
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages7 packages
🔴Vulnerability Details
4CVEList▶
CVE-2024-11697: When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog↗2024-11-26
OSV▶
CVE-2024-11697: When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog↗2024-11-26
GHSA▶
GHSA-4jp9-q9g7-48gr: When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog↗2024-11-26
📋Vendor Advisories
7Red Hat
▶
Debian▶
CVE-2024-11697: firefox - When handling keypress events, an attacker may have been able to trick a user in...↗2024