Описание
Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-1238
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41449
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9889
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2008-0208.html
- http://secunia.com/advisories/29391
- http://secunia.com/advisories/29526
- http://secunia.com/advisories/29539
- http://secunia.com/advisories/29541
- http://secunia.com/advisories/29547
- http://secunia.com/advisories/29550
- http://secunia.com/advisories/29558
- http://secunia.com/advisories/29560
- http://secunia.com/advisories/29607
- http://secunia.com/advisories/29616
- http://secunia.com/advisories/29645
- http://secunia.com/advisories/30327
- http://secunia.com/advisories/30620
- http://sla.ckers.org/forum/read.php?10%2C20033
- http://sla.ckers.org/forum/read.php?10,20033
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128
- http://www.debian.org/security/2008/dsa-1532
- http://www.debian.org/security/2008/dsa-1534
- http://www.debian.org/security/2008/dsa-1535
- http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:080
- http://www.mozilla.org/security/announce/2008/mfsa2008-16.html
- http://www.redhat.com/support/errata/RHSA-2008-0207.html
- http://www.redhat.com/support/errata/RHSA-2008-0209.html
- http://www.securityfocus.com/archive/1/490196/100/0/threaded
- http://www.securityfocus.com/bid/28448
- http://www.securitytracker.com/id?1019703
- http://www.ubuntu.com/usn/usn-592-1
- http://www.us-cert.gov/cas/techalerts/TA08-087A.html
- http://www.vupen.com/english/advisories/2008/0998/references
- http://www.vupen.com/english/advisories/2008/1793/references
Связанные уязвимости
Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when gener ...