CVE-2024-0605
📋 TL;DR
This vulnerability allows attackers to execute unauthorized JavaScript on websites by exploiting a race condition with javascript: URIs in the URL bar. It bypasses security measures in Firefox Focus for iOS, potentially enabling arbitrary code execution. Only users of Firefox Focus for iOS versions below 122 are affected.
💻 Affected Systems
- Firefox Focus for iOS
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of user sessions, data theft, and arbitrary code execution within the browser context.
Likely Case
Session hijacking, credential theft, and unauthorized actions on visited websites.
If Mitigated
Limited impact with proper browser sandboxing and updated versions.
🎯 Exploit Status
Requires user interaction (visiting malicious site) but no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 122
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-03/
Restart Required: Yes
Instructions:
1. Open the App Store on iOS. 2. Search for Firefox Focus. 3. Tap Update to version 122 or later. 4. Restart the browser.
🔧 Temporary Workarounds
Disable JavaScript
iosTemporarily disable JavaScript execution in browser settings
🧯 If You Can't Patch
- Discontinue use of Firefox Focus for iOS
- Switch to alternative browsers like Safari or Chrome
🔍 How to Verify
Check if Vulnerable:
Check Firefox Focus version in iOS Settings > Firefox Focus > Version
Check Version:
Not applicable - check via iOS app settings
Verify Fix Applied:
Confirm version is 122 or higher in app settings
📡 Detection & Monitoring
Log Indicators:
- Unusual javascript: URI patterns in browser logs
- Multiple rapid setTimeout calls
Network Indicators:
- Suspicious redirects to javascript: URIs
SIEM Query:
Not applicable for mobile browser vulnerabilities