CVE-2024-10462
📋 TL;DR
This vulnerability allows attackers to spoof website origins in permission prompts by truncating long URLs, potentially tricking users into granting permissions to malicious sites. It affects Firefox, Firefox ESR, and Thunderbird users running outdated versions.
💻 Affected Systems
- Firefox
- Firefox ESR
- Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox by Mozilla
Thunderbird by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Attackers could impersonate legitimate websites in permission prompts, leading users to grant sensitive permissions (like location, camera, microphone) to malicious sites.
Likely Case
Users might be tricked into granting permissions to spoofed websites, potentially exposing sensitive data or enabling further attacks.
If Mitigated
With updated browsers and user awareness, the risk is minimal as the vulnerability is patched and users can verify URLs before granting permissions.
🎯 Exploit Status
Exploitation requires user interaction (clicking permission prompts) but doesn't require authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 132+, Firefox ESR 128.4+, Thunderbird 128.4+, Thunderbird 132+
Vendor Advisory: https://www.mozilla.org/security/advisories/
Restart Required: Yes
Instructions:
1. Open Firefox/Thunderbird. 2. Go to Settings/Preferences > General/About. 3. Allow automatic update or manually download latest version from mozilla.org. 4. Restart the application.
🔧 Temporary Workarounds
Disable automatic permission grants
allConfigure browsers to require explicit user approval for all permission requests
🧯 If You Can't Patch
- Educate users to carefully inspect full URLs in permission prompts before granting access
- Implement network filtering to block known malicious domains
🔍 How to Verify
Check if Vulnerable:
Check browser version in Settings/Preferences > General/About and compare with affected versions.
Check Version:
firefox --version or thunderbird --version on command line
Verify Fix Applied:
Confirm version is Firefox 132+, Firefox ESR 128.4+, Thunderbird 128.4+, or Thunderbird 132+.
📡 Detection & Monitoring
Log Indicators:
- Unusual permission grants to domains with truncated URLs
- Multiple permission requests from similar-looking domains
Network Indicators:
- Requests to domains with unusually long URLs that get truncated
SIEM Query:
source="browser_logs" AND event="permission_granted" AND url_length>100
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1920423
- https://www.mozilla.org/security/advisories/mfsa2024-55/
- https://www.mozilla.org/security/advisories/mfsa2024-56/
- https://www.mozilla.org/security/advisories/mfsa2024-58/
- https://www.mozilla.org/security/advisories/mfsa2024-59/
- https://lists.debian.org/debian-lts-announce/2024/10/msg00034.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00001.html