CVE-2024-5699 — Improper Handling of Case Sensitivity in Mozilla Firefox
Severity
9.8CRITICALNVD
OSV8.1
EPSS
0.6%
top 30.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 11
Latest updateJul 3
Description
In violation of spec, cookie prefixes such as `__Secure` were being ignored if they were not correctly capitalized - by spec they should be checked with a case-insensitive comparison. This could have resulted in the browser not correctly honoring the behaviors specified by the prefix. This vulnerability affects Firefox < 127.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
🔴Vulnerability Details
4OSV▶
CVE-2024-5699: In violation of spec, cookie prefixes such as `__Secure` were being ignored if they were not correctly capitalized - by spec they should be checked wi↗2024-06-11
CVEList▶
CVE-2024-5699: In violation of spec, cookie prefixes such as `__Secure` were being ignored if they were not correctly capitalized - by spec they should be checked wi↗2024-06-11
GHSA▶
GHSA-893r-mpwj-qhhg: In violation of spec, cookie prefixes such as `__Secure` were being ignored if they were not correctly capitalized - by spec they should be checked wi↗2024-06-11
📋Vendor Advisories
4Microsoft▶
In violation of spec, cookie prefixes such as `__Secure` were being ignored if they were not correctly capitalized - by spec they should be checked with a case-insensitive comparison. This could have ↗2024-06-11
Debian▶
CVE-2024-5699: firefox - In violation of spec, cookie prefixes such as `__Secure` were being ignored if t...↗2024