First published: Tue Jan 23 2018(Updated: )
If an existing cookie is changed to be "HttpOnly" while a document is open, the original value remains accessible through script until that document is closed. Network requests correctly use the changed HttpOnly cookie. This vulnerability affects Firefox < 58.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <58 | 58 |
Mozilla Firefox | <=57.0.4 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
debian/firefox | 131.0.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-5114 is a vulnerability that allows the original value of a cookie to remain accessible through script even after it has been changed to be HttpOnly.
Firefox versions before 58 are affected by CVE-2018-5114.
CVE-2018-5114 has a severity level of 5.3, which is considered medium.
To fix CVE-2018-5114, update Firefox to version 58 or higher.
You can find more information about CVE-2018-5114 on the Mozilla website and Bugzilla.