CVE-2024-7524

Name
CVE-2024-7524
Description
Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in "strict-dynamic" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://bugzilla.mozilla.org/show_bug.cgi?id=1909241
https://www.mozilla.org/security/advisories/mfsa2024-33/
https://www.mozilla.org/security/advisories/mfsa2024-34/
https://www.mozilla.org/security/advisories/mfsa2024-35/

Match rules

CPE URI Source package Min version Max version
firefox >= unspecified < 129
firefox-esr >= unspecified < 115.14
firefox-esr >= unspecified < 128.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
firefox 3.20-community 128.0.3-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable
firefox-esr 3.20-community 115.13.0-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable
firefox-esr edge-community 115.15.0-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable