2024-08-29 18:03:15 +00:00

116 lines
3.9 KiB
JSON

{
"id": "CVE-2024-7524",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-08-06T13:15:57.357",
"lastModified": "2024-08-29T17:35:34.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in \"strict-dynamic\" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
},
{
"lang": "es",
"value": "Firefox agrega ajustes de compatibilidad web en lugar de algunos scripts de seguimiento bloqueados por la Protecci\u00f3n de seguimiento mejorada. En un sitio protegido por la Pol\u00edtica de seguridad de contenido en modo \"din\u00e1mico estricto\", un atacante capaz de inyectar un elemento HTML podr\u00eda haber utilizado un ataque DOM Clobbering en algunas de las correcciones y lograr XSS, evitando la protecci\u00f3n din\u00e1mica estricta del CSP. Esta vulnerabilidad afecta a Firefox &lt; 129, Firefox ESR &lt; 115.14 y Firefox ESR &lt; 128.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "129.0",
"matchCriteriaId": "12C9ABF7-3B44-4C24-B152-488DCF9E2D39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "115.14",
"matchCriteriaId": "77E36842-1F83-4A47-94D2-5D0A9825D3C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "116.0",
"versionEndExcluding": "128.1",
"matchCriteriaId": "38D2AF1C-E314-45EE-A2A9-7B44DA2A4ACF"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909241",
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}