First published: Tue Jun 11 2024(Updated: )
If a specific sequence of actions is performed when opening a new tab, the triggering principal associated with the new tab may have been incorrect. The triggering principal is used to calculate many values, including the `Referer` and `Sec-*` headers, meaning there is the potential for incorrect security checks within the browser in addition to incorrect or misleading information sent to remote websites. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 127.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <127 | 127 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2024-5687 is classified as moderate, as it results in incorrect handling of privacy-sensitive headers.
To fix CVE-2024-5687, users should update to the latest version of Mozilla Firefox beyond version 127.
CVE-2024-5687 may result in exposure of inaccurate `Referer` and `Sec-*` headers, posing a risk to user privacy.
CVE-2024-5687 requires a specific sequence of actions to be exploitable, making it less likely to affect users under normal conditions.
CVE-2024-5687 affects Mozilla Firefox versions prior to 127.