CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set in Mozilla Firefox
When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
AI Analysis
Technical Summary
CVE-2024-0747 is a vulnerability in Mozilla Firefox (versions prior to 122), Firefox ESR (prior to 115.7), and Thunderbird (prior to 115.7) that allows a bypass of the Content Security Policy (CSP) under specific conditions. CSP is a security standard designed to prevent cross-site scripting (XSS), clickjacking, and other code injection attacks by restricting the sources from which content can be loaded and executed. This vulnerability arises when a parent webpage loads a child page within an iframe and the parent’s CSP includes the 'unsafe-inline' directive. In this scenario, the parent page’s CSP can override the child page’s CSP, effectively weakening the child’s intended security restrictions. The 'unsafe-inline' directive permits the execution of inline scripts, which is generally discouraged due to the risk of injection attacks. By allowing the parent CSP to override the child’s CSP, attackers could potentially inject malicious inline scripts into the child iframe content, leading to integrity violations such as unauthorized script execution. This vulnerability is classified under CWE-693 (Protection Mechanism Failure), indicating a failure in enforcing security policies properly. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (remote exploitation possible), low attack complexity, no privileges required, but requiring user interaction. The impact is primarily on integrity, with no direct confidentiality or availability impact. No known exploits are currently reported in the wild, and no official patches were linked at the time of publication, though updates to Firefox and Thunderbird beyond the affected versions are expected to address this issue.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying heavily on Firefox or Thunderbird for web browsing and email communication. The ability to bypass CSP can facilitate injection of malicious scripts within iframe content, potentially leading to unauthorized actions such as session hijacking, data manipulation, or execution of malicious code within the context of trusted sites. This could undermine web application security, particularly for internal portals or cloud services that embed third-party content via iframes. The impact is heightened in environments where users are targeted by phishing or social engineering attacks that lure them into interacting with maliciously crafted web pages. Since the vulnerability requires user interaction and the presence of 'unsafe-inline' in the parent CSP, organizations with strict CSP policies that avoid 'unsafe-inline' are less at risk. However, many legacy or misconfigured web applications still use 'unsafe-inline', increasing exposure. The integrity compromise could lead to data tampering or unauthorized actions without direct data leakage or service disruption. This risk is relevant for sectors with high security requirements such as finance, government, healthcare, and critical infrastructure in Europe.
Mitigation Recommendations
European organizations should prioritize updating Firefox and Thunderbird clients to versions 122 and 115.7 or later, respectively, where this vulnerability is fixed. Web developers and security teams should audit and revise CSP implementations to avoid using the 'unsafe-inline' directive, especially in parent pages that embed iframes. Instead, they should adopt safer CSP practices such as using nonces or hashes for inline scripts and restricting script sources explicitly. Organizations should conduct security reviews of web applications that use iframes to ensure CSP policies are correctly scoped and do not allow unintended overrides. User awareness training should emphasize caution when interacting with unfamiliar web content, particularly content embedded in iframes. Network-level protections such as web filtering and intrusion detection systems can help detect and block suspicious script injection attempts. Additionally, monitoring for unusual script execution behaviors in browsers can provide early warning of exploitation attempts. Since no known exploits are reported, proactive patching and CSP hardening remain the best defenses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set in Mozilla Firefox
Description
When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
AI-Powered Analysis
Technical Analysis
CVE-2024-0747 is a vulnerability in Mozilla Firefox (versions prior to 122), Firefox ESR (prior to 115.7), and Thunderbird (prior to 115.7) that allows a bypass of the Content Security Policy (CSP) under specific conditions. CSP is a security standard designed to prevent cross-site scripting (XSS), clickjacking, and other code injection attacks by restricting the sources from which content can be loaded and executed. This vulnerability arises when a parent webpage loads a child page within an iframe and the parent’s CSP includes the 'unsafe-inline' directive. In this scenario, the parent page’s CSP can override the child page’s CSP, effectively weakening the child’s intended security restrictions. The 'unsafe-inline' directive permits the execution of inline scripts, which is generally discouraged due to the risk of injection attacks. By allowing the parent CSP to override the child’s CSP, attackers could potentially inject malicious inline scripts into the child iframe content, leading to integrity violations such as unauthorized script execution. This vulnerability is classified under CWE-693 (Protection Mechanism Failure), indicating a failure in enforcing security policies properly. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (remote exploitation possible), low attack complexity, no privileges required, but requiring user interaction. The impact is primarily on integrity, with no direct confidentiality or availability impact. No known exploits are currently reported in the wild, and no official patches were linked at the time of publication, though updates to Firefox and Thunderbird beyond the affected versions are expected to address this issue.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying heavily on Firefox or Thunderbird for web browsing and email communication. The ability to bypass CSP can facilitate injection of malicious scripts within iframe content, potentially leading to unauthorized actions such as session hijacking, data manipulation, or execution of malicious code within the context of trusted sites. This could undermine web application security, particularly for internal portals or cloud services that embed third-party content via iframes. The impact is heightened in environments where users are targeted by phishing or social engineering attacks that lure them into interacting with maliciously crafted web pages. Since the vulnerability requires user interaction and the presence of 'unsafe-inline' in the parent CSP, organizations with strict CSP policies that avoid 'unsafe-inline' are less at risk. However, many legacy or misconfigured web applications still use 'unsafe-inline', increasing exposure. The integrity compromise could lead to data tampering or unauthorized actions without direct data leakage or service disruption. This risk is relevant for sectors with high security requirements such as finance, government, healthcare, and critical infrastructure in Europe.
Mitigation Recommendations
European organizations should prioritize updating Firefox and Thunderbird clients to versions 122 and 115.7 or later, respectively, where this vulnerability is fixed. Web developers and security teams should audit and revise CSP implementations to avoid using the 'unsafe-inline' directive, especially in parent pages that embed iframes. Instead, they should adopt safer CSP practices such as using nonces or hashes for inline scripts and restricting script sources explicitly. Organizations should conduct security reviews of web applications that use iframes to ensure CSP policies are correctly scoped and do not allow unintended overrides. User awareness training should emphasize caution when interacting with unfamiliar web content, particularly content embedded in iframes. Network-level protections such as web filtering and intrusion detection systems can help detect and block suspicious script injection attempts. Additionally, monitoring for unusual script execution behaviors in browsers can provide early warning of exploitation attempts. Since no known exploits are reported, proactive patching and CSP hardening remain the best defenses.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2024-01-19T16:52:25.524Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f64490acd01a2492644d1
Added to database: 5/22/2025, 5:52:09 PM
Last enriched: 7/8/2025, 8:57:51 AM
Last updated: 7/31/2025, 9:22:10 AM
Views: 14
Related Threats
CVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumCVE-2025-8720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in morehawes Plugin README Parser
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.