Show plain JSON{"affected_release": [{"advisory": "RHSA-2024:5324", "cpe": "cpe:/o:redhat:rhel_els:7", "package": "firefox-0:115.14.0-2.el7_9", "product_name": "Red Hat Enterprise Linux 7 Extended Lifecycle Support", "release_date": "2024-08-13T00:00:00Z"}, {"advisory": "RHSA-2024:5391", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:115.14.0-2.el8_10", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-08-14T00:00:00Z"}, {"advisory": "RHSA-2024:5323", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:115.14.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2024-08-13T00:00:00Z"}, {"advisory": "RHSA-2024:5325", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "firefox-0:115.14.0-2.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2024-08-13T00:00:00Z"}, {"advisory": "RHSA-2024:5325", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "firefox-0:115.14.0-2.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2024-08-13T00:00:00Z"}, {"advisory": "RHSA-2024:5325", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "firefox-0:115.14.0-2.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2024-08-13T00:00:00Z"}, {"advisory": "RHSA-2024:5326", "cpe": "cpe:/a:redhat:rhel_aus:8.6", "package": "firefox-0:115.14.0-2.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support", "release_date": "2024-08-13T00:00:00Z"}, {"advisory": "RHSA-2024:5326", "cpe": "cpe:/a:redhat:rhel_tus:8.6", "package": "firefox-0:115.14.0-2.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2024-08-13T00:00:00Z"}, {"advisory": "RHSA-2024:5326", "cpe": "cpe:/a:redhat:rhel_e4s:8.6", "package": "firefox-0:115.14.0-2.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2024-08-13T00:00:00Z"}, {"advisory": "RHSA-2024:5329", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "firefox-0:115.14.0-2.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-08-13T00:00:00Z"}, {"advisory": "RHSA-2024:5322", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:115.14.0-2.el9_4", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-08-15T00:00:00Z"}, {"advisory": "RHSA-2024:5327", "cpe": "cpe:/a:redhat:rhel_e4s:9.0", "package": "firefox-0:115.14.0-2.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions", "release_date": "2024-08-13T00:00:00Z"}, {"advisory": "RHSA-2024:5328", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "firefox-0:115.14.0-2.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2024-08-13T00:00:00Z"}], "bugzilla": {"description": "mozilla: CSP strict-dynamic bypass using web-compatibility shims", "id": "2303141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303141"}, "csaw": false, "cvss3": {"cvss3_base_score": "6.1", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "status": "verified"}, "cwe": "CWE-79", "details": ["Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in \"strict-dynamic\" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.", "The Mozilla Foundation Security Advisory describes this flaw as:\nFirefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in \"strict-dynamic\" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection."], "name": "CVE-2024-7524", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 9"}], "public_date": "2024-08-06T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2024-7524\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-7524\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7524"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Important"}