First published: Mon Jan 22 2024(Updated: )
Using a javascript: URI with a setTimeout race condition, an attacker can execute unauthorized scripts on top origin sites in urlbar. This bypasses security measures, potentially leading to arbitrary code execution or unauthorized actions within the user's loaded webpage.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Focus | <122.0 | |
All of | ||
Mozilla Focus | =122 | |
Apple iOS and iPadOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0605 is considered a high severity vulnerability due to its potential for arbitrary code execution.
To mitigate CVE-2024-0605, ensure you are using the latest version of affected browsers, specifically updates beyond version 122 for Mozilla Focus and Firefox.
CVE-2024-0605 allows attackers to execute unauthorized scripts and perform actions within a user's loaded webpage.
CVE-2024-0605 affects Mozilla Focus version 122 and earlier, as well as specific versions of Firefox on Apple iOS.
CVE-2024-0605 exploits a race condition in handling javascript: URIs, bypassing security measures to execute unauthorized scripts.