Skip to main content

CVE-2024-0749: Phishing site popup could show local origin in address bar in Mozilla Firefox

Medium
VulnerabilityCVE-2024-0749cvecve-2024-0749
Published: Tue Jan 23 2024 (01/23/2024, 13:48:17 UTC)
Source: CVE
Vendor/Project: Mozilla
Product: Firefox

Description

A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122 and Thunderbird < 115.7.

AI-Powered Analysis

AILast updated: 07/08/2025, 09:12:01 UTC

Technical Analysis

CVE-2024-0749 is a medium-severity vulnerability affecting Mozilla Firefox versions prior to 122 and Thunderbird versions prior to 115.7. The issue involves a phishing site exploiting repurposed `about:` dialogs to display phishing content while incorrectly showing a local origin in the browser's address bar. This misrepresentation can deceive users into believing they are interacting with a trusted local resource or legitimate site, thereby increasing the likelihood of successful phishing attacks. Technically, the vulnerability relates to CWE-346, which concerns improper verification of cryptographic signatures, or more broadly, insufficient origin validation. The flaw allows an attacker-controlled phishing page to manipulate the browser UI to show a misleading origin, undermining the browser's security indicators that users rely on to verify site authenticity. Exploitation requires no privileges and no prior authentication but does require user interaction to visit the malicious phishing site. The CVSS v3.1 base score is 4.3, reflecting a network attack vector, low attack complexity, no privileges required, but requiring user interaction, with no impact on confidentiality or availability, and only limited impact on integrity (due to UI spoofing). No known exploits are currently reported in the wild, and no patches are linked yet, indicating this is a recently disclosed issue. The vulnerability primarily facilitates social engineering attacks by enabling phishing sites to appear more credible through UI spoofing of the origin in the address bar, potentially leading to credential theft or other user-targeted attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily through social engineering and phishing campaigns. Since Firefox is widely used across Europe in both corporate and personal environments, attackers could leverage this flaw to craft convincing phishing pages that appear to originate from trusted local sources or legitimate domains. This could lead to credential compromise, unauthorized access to sensitive systems, or the installation of malware if users are deceived into interacting with malicious content. The impact is particularly critical for sectors with high reliance on secure communications and data integrity, such as financial services, government agencies, healthcare, and critical infrastructure operators. The UI spoofing undermines user trust in browser security indicators, potentially increasing the success rate of phishing attacks targeting European users. However, since the vulnerability does not directly compromise confidentiality or availability, the impact is indirect but still serious due to the potential for downstream consequences of successful phishing.

Mitigation Recommendations

European organizations should prioritize updating Mozilla Firefox to version 122 or later and Thunderbird to version 115.7 or later as soon as patches become available. Until patches are released, organizations should implement targeted user awareness campaigns emphasizing caution when interacting with unexpected dialogs or unusual browser address bar behavior, especially on Firefox and Thunderbird. Deploying advanced email and web filtering solutions that detect and block phishing URLs can reduce exposure to malicious sites exploiting this vulnerability. Security teams should monitor threat intelligence feeds for any emerging exploit attempts related to CVE-2024-0749. Additionally, organizations can consider configuring browser policies to restrict or disable the use of `about:` dialogs or limit their content where feasible. Multi-factor authentication (MFA) should be enforced to mitigate the impact of credential theft resulting from phishing. Finally, incident response plans should be updated to quickly address phishing incidents potentially leveraging this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2024-01-19T16:52:25.908Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f64490acd01a2492644f4

Added to database: 5/22/2025, 5:52:09 PM

Last enriched: 7/8/2025, 9:12:01 AM

Last updated: 7/31/2025, 5:15:11 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats