First published: Tue Nov 15 2022(Updated: )
When a ServiceWorker intercepted a request with <code>FetchEvent</code>, the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections. This was addressed in the spec and then in browsers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <102.5 | 102.5 |
<107 | 107 | |
<102.5 | 102.5 | |
<102.5 | 102.5 | |
Mozilla Firefox | <107.0 | |
Mozilla Firefox ESR | <102.5 | |
Mozilla Thunderbird | <102.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2022-45410 is medium.
CVE-2022-45410 affects Mozilla Thunderbird, Mozilla Firefox, and Mozilla Firefox ESR.
CVE-2022-45410 exploits SameSite cookie protections by causing the origin of a request to be lost after a ServiceWorker intercepts it.
Yes, CVE-2022-45410 has been addressed in browsers.
You can find more information about CVE-2022-45410 at the following references: [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1658869), [Mozilla Security Advisory - mfsa2022-49](https://www.mozilla.org/en-US/security/advisories/mfsa2022-49/), [Mozilla Security Advisory - mfsa2022-47](https://www.mozilla.org/en-US/security/advisories/mfsa2022-47/).