VULNERABILITY:
Firefox only stores up to 1024 HSTS entries.
When the limit is reached, Firefox discards entries based on their age and recent visits to the domain in question.

.

seclists.org/fulldisclosure/20

Follow

IMPACT:
The HSTS header ensures that once a page has been visited, the browser will attempt to connect to it using HTTPS. The limit means that Firefox effectively does not store any further HSTS headers, as new ones permanently override each other. Sites without HSTS protection are vulnerable to machine-in-the-middle attacks, especially downgrade attacks such as SSL Stripping.

@ecksmc "Sites without HSTS protection are vulnerable..."
Makes it sound like this isn't necessarily just a Firefox vulnerability, but you'd need someone to be using Firefox to exploit it.

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.