Уязвимость изменения или удаления произвольных cookies в HTTPS сессиях в Mozilla Firefox
Описание
В версиях браузера Mozilla Firefox до релиза 4 недостаточно ограничены возможности модификации cookies, установленных в рамках HTTPS сессий. Это позволяет злоумышленнику изменять или удалять произвольные cookies посредством заголовка Set-Cookie в HTTP ответе. Уязвимость связана с отсутствием функции includeSubDomains в HTTP Strict Transport Security (HSTS).
Затронутые версии ПО
- Mozilla Firefox до версии 4
Тип уязвимости
- Подмена cookies
Ссылки
- Patch
- Patch
Уязвимые конфигурации
Одно из
EPSS
5.8 Medium
CVSS2
Дефекты
Связанные уязвимости
Mozilla Firefox before 4 cannot properly restrict modifications to cookies established in HTTPS sessions, which allows man-in-the-middle attackers to overwrite or delete arbitrary cookies via a Set-Cookie header in an HTTP response, related to lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, aka a "cookie forcing" issue.
Mozilla Firefox before 4 cannot properly restrict modifications to cookies established in HTTPS sessions, which allows man-in-the-middle attackers to overwrite or delete arbitrary cookies via a Set-Cookie header in an HTTP response, related to lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, aka a "cookie forcing" issue.
Mozilla Firefox before 4 cannot properly restrict modifications to coo ...
Mozilla Firefox before 4 cannot properly restrict modifications to cookies established in HTTPS sessions, which allows man-in-the-middle attackers to overwrite or delete arbitrary cookies via a Set-Cookie header in an HTTP response, related to lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, aka a "cookie forcing" issue.
EPSS
5.8 Medium
CVSS2