CVE-2024-5022

4.4 MEDIUM

📋 TL;DR

This vulnerability in Firefox Focus for iOS allows URL spoofing by hiding the file scheme in the location bar, potentially tricking users into believing they're on a legitimate website when viewing local files. It affects Firefox Focus for iOS versions before 126. Users could be deceived into interacting with malicious content disguised as trusted sites.

💻 Affected Systems

Products:
  • Firefox Focus for iOS
Versions: All versions before 126
Operating Systems: iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Firefox Focus browser on iOS devices; other browsers and platforms are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into entering sensitive information into malicious local pages disguised as legitimate banking, social media, or login portals, leading to credential theft or financial fraud.

🟠

Likely Case

Users might be deceived into clicking on malicious links or downloading harmful files from spoofed websites, potentially leading to phishing attacks or malware installation.

🟢

If Mitigated

With proper user awareness and updated browsers, impact is minimal as users would notice the file:// scheme or be protected by updated software.

🌐 Internet-Facing: LOW
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking a malicious link) but no authentication or special privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 126

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2024-24/

Restart Required: Yes

Instructions:

1. Open the App Store on your iOS device. 2. Search for Firefox Focus. 3. Tap Update to install version 126 or later. 4. Restart the browser after update completes.

🔧 Temporary Workarounds

Use alternative browser

ios

Temporarily switch to a different browser until Firefox Focus is updated.

Disable Firefox Focus

ios

Remove or disable Firefox Focus browser until patched.

🧯 If You Can't Patch

  • Educate users to verify URLs carefully and look for file:// scheme indicators
  • Implement network filtering to block access to file:// URLs from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Open Firefox Focus, go to Settings > About to check version number. If version is less than 126, you are vulnerable.

Check Version:

Not applicable for iOS apps; check via app settings.

Verify Fix Applied:

After updating, verify version is 126 or higher in Settings > About. Test by visiting a file:// URL to confirm scheme is displayed.

📡 Detection & Monitoring

Log Indicators:

  • User reports of suspicious URLs or phishing attempts
  • Access to file:// URLs from web traffic

Network Indicators:

  • HTTP requests containing file:// scheme in referrer or location headers

SIEM Query:

Not typically applicable for client-side browser vulnerabilities.

🔗 References

📤 Share & Export