CVE-2024-0749: Phishing site popup could show local origin in address bar in Mozilla Firefox
A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122 and Thunderbird < 115.7.
AI Analysis
Technical Summary
CVE-2024-0749 is a medium-severity vulnerability affecting Mozilla Firefox versions prior to 122 and Thunderbird versions prior to 115.7. The issue involves a phishing site exploiting repurposed `about:` dialogs to display phishing content while incorrectly showing a local origin in the browser's address bar. This misrepresentation can deceive users into believing they are interacting with a trusted local resource or legitimate site, thereby increasing the likelihood of successful phishing attacks. Technically, the vulnerability relates to CWE-346, which concerns improper verification of cryptographic signatures, or more broadly, insufficient origin validation. The flaw allows an attacker-controlled phishing page to manipulate the browser UI to show a misleading origin, undermining the browser's security indicators that users rely on to verify site authenticity. Exploitation requires no privileges and no prior authentication but does require user interaction to visit the malicious phishing site. The CVSS v3.1 base score is 4.3, reflecting a network attack vector, low attack complexity, no privileges required, but requiring user interaction, with no impact on confidentiality or availability, and only limited impact on integrity (due to UI spoofing). No known exploits are currently reported in the wild, and no patches are linked yet, indicating this is a recently disclosed issue. The vulnerability primarily facilitates social engineering attacks by enabling phishing sites to appear more credible through UI spoofing of the origin in the address bar, potentially leading to credential theft or other user-targeted attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily through social engineering and phishing campaigns. Since Firefox is widely used across Europe in both corporate and personal environments, attackers could leverage this flaw to craft convincing phishing pages that appear to originate from trusted local sources or legitimate domains. This could lead to credential compromise, unauthorized access to sensitive systems, or the installation of malware if users are deceived into interacting with malicious content. The impact is particularly critical for sectors with high reliance on secure communications and data integrity, such as financial services, government agencies, healthcare, and critical infrastructure operators. The UI spoofing undermines user trust in browser security indicators, potentially increasing the success rate of phishing attacks targeting European users. However, since the vulnerability does not directly compromise confidentiality or availability, the impact is indirect but still serious due to the potential for downstream consequences of successful phishing.
Mitigation Recommendations
European organizations should prioritize updating Mozilla Firefox to version 122 or later and Thunderbird to version 115.7 or later as soon as patches become available. Until patches are released, organizations should implement targeted user awareness campaigns emphasizing caution when interacting with unexpected dialogs or unusual browser address bar behavior, especially on Firefox and Thunderbird. Deploying advanced email and web filtering solutions that detect and block phishing URLs can reduce exposure to malicious sites exploiting this vulnerability. Security teams should monitor threat intelligence feeds for any emerging exploit attempts related to CVE-2024-0749. Additionally, organizations can consider configuring browser policies to restrict or disable the use of `about:` dialogs or limit their content where feasible. Multi-factor authentication (MFA) should be enforced to mitigate the impact of credential theft resulting from phishing. Finally, incident response plans should be updated to quickly address phishing incidents potentially leveraging this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-0749: Phishing site popup could show local origin in address bar in Mozilla Firefox
Description
A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122 and Thunderbird < 115.7.
AI-Powered Analysis
Technical Analysis
CVE-2024-0749 is a medium-severity vulnerability affecting Mozilla Firefox versions prior to 122 and Thunderbird versions prior to 115.7. The issue involves a phishing site exploiting repurposed `about:` dialogs to display phishing content while incorrectly showing a local origin in the browser's address bar. This misrepresentation can deceive users into believing they are interacting with a trusted local resource or legitimate site, thereby increasing the likelihood of successful phishing attacks. Technically, the vulnerability relates to CWE-346, which concerns improper verification of cryptographic signatures, or more broadly, insufficient origin validation. The flaw allows an attacker-controlled phishing page to manipulate the browser UI to show a misleading origin, undermining the browser's security indicators that users rely on to verify site authenticity. Exploitation requires no privileges and no prior authentication but does require user interaction to visit the malicious phishing site. The CVSS v3.1 base score is 4.3, reflecting a network attack vector, low attack complexity, no privileges required, but requiring user interaction, with no impact on confidentiality or availability, and only limited impact on integrity (due to UI spoofing). No known exploits are currently reported in the wild, and no patches are linked yet, indicating this is a recently disclosed issue. The vulnerability primarily facilitates social engineering attacks by enabling phishing sites to appear more credible through UI spoofing of the origin in the address bar, potentially leading to credential theft or other user-targeted attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily through social engineering and phishing campaigns. Since Firefox is widely used across Europe in both corporate and personal environments, attackers could leverage this flaw to craft convincing phishing pages that appear to originate from trusted local sources or legitimate domains. This could lead to credential compromise, unauthorized access to sensitive systems, or the installation of malware if users are deceived into interacting with malicious content. The impact is particularly critical for sectors with high reliance on secure communications and data integrity, such as financial services, government agencies, healthcare, and critical infrastructure operators. The UI spoofing undermines user trust in browser security indicators, potentially increasing the success rate of phishing attacks targeting European users. However, since the vulnerability does not directly compromise confidentiality or availability, the impact is indirect but still serious due to the potential for downstream consequences of successful phishing.
Mitigation Recommendations
European organizations should prioritize updating Mozilla Firefox to version 122 or later and Thunderbird to version 115.7 or later as soon as patches become available. Until patches are released, organizations should implement targeted user awareness campaigns emphasizing caution when interacting with unexpected dialogs or unusual browser address bar behavior, especially on Firefox and Thunderbird. Deploying advanced email and web filtering solutions that detect and block phishing URLs can reduce exposure to malicious sites exploiting this vulnerability. Security teams should monitor threat intelligence feeds for any emerging exploit attempts related to CVE-2024-0749. Additionally, organizations can consider configuring browser policies to restrict or disable the use of `about:` dialogs or limit their content where feasible. Multi-factor authentication (MFA) should be enforced to mitigate the impact of credential theft resulting from phishing. Finally, incident response plans should be updated to quickly address phishing incidents potentially leveraging this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2024-01-19T16:52:25.908Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f64490acd01a2492644f4
Added to database: 5/22/2025, 5:52:09 PM
Last enriched: 7/8/2025, 9:12:01 AM
Last updated: 7/31/2025, 5:15:11 AM
Views: 14
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.