{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-4583","assignerOrgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","state":"PUBLISHED","assignerShortName":"mozilla","dateReserved":"2023-08-29T03:37:00.389Z","datePublished":"2023-09-11T08:02:01.933Z","dateUpdated":"2025-12-18T15:23:17.682Z"},"containers":{"cna":{"affected":[{"product":"Firefox","vendor":"Mozilla","versions":[{"lessThan":"117","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"Firefox ESR","vendor":"Mozilla","versions":[{"lessThan":"115.2","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"Thunderbird","vendor":"Mozilla","versions":[{"lessThan":"115.2","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"When checking if the Browsing Context had been discarded in `HttpBaseChannel`, if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.","supportingMedia":[{"type":"text/html","base64":false,"value":"When checking if the Browsing Context had been discarded in <code>HttpBaseChannel</code>, if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2."}]}],"title":"Browsing Context potentially not cleared when closing Private Window","references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1842030"},{"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"}],"credits":[{"lang":"en","value":"Thejaka Maldeniya"}],"providerMetadata":{"orgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","shortName":"mozilla","dateUpdated":"2025-12-18T15:23:17.682Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:31:06.553Z"},"title":"CVE Program Container","references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1842030","tags":["x_transferred"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","tags":["x_transferred"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","tags":["x_transferred"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-754","lang":"en","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-09-19T19:09:13.239970Z","id":"CVE-2023-4583","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-19T19:57:57.681Z"}}]}}