Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 999 | all | firefox | < 123.0-1 | firefox_123.0-1_all.deb |
Debian | 12 | all | firefox-esr | < 115.8.0esr-1~deb12u1 | firefox-esr_115.8.0esr-1~deb12u1_all.deb |
Debian | 11 | all | firefox-esr | < 115.8.0esr-1~deb11u1 | firefox-esr_115.8.0esr-1~deb11u1_all.deb |
Debian | 999 | all | firefox-esr | < 115.8.0esr-1 | firefox-esr_115.8.0esr-1_all.deb |
Debian | 13 | all | firefox-esr | < 115.8.0esr-1 | firefox-esr_115.8.0esr-1_all.deb |
Debian | 12 | all | thunderbird | < 1:115.8.0-1~deb12u1 | thunderbird_1:115.8.0-1~deb12u1_all.deb |
Debian | 11 | all | thunderbird | < 1:115.8.0-1~deb11u1 | thunderbird_1:115.8.0-1~deb11u1_all.deb |
Debian | 999 | all | thunderbird | < 1:115.8.0-1 | thunderbird_1:115.8.0-1_all.deb |
Debian | 13 | all | thunderbird | < 1:115.8.0-1 | thunderbird_1:115.8.0-1_all.deb |