Уязвимость спуфинга адресной строки в Mozilla Firefox, Thunderbird и SeaMonkey через манипуляцию информацией аутентификации в URL
Описание
Злоумышленники могут воспользоваться уязвимостью в Mozilla Firefox, Thunderbird и SeaMonkey для спуфинга адресной строки. Уязвимость вызвана некорректной обработкой информации аутентификации в поле userinfo URL в сочетании с кодом состояния HTTP 204 (известный как No Content).
Затронутые версии ПО
- Mozilla Firefox до 18.0
- Mozilla Firefox ESR 10.x до 10.0.12 и 17.x до 17.0.2
- Mozilla Thunderbird до 17.0.2
- Mozilla Thunderbird ESR 10.x до 10.0.12 и 17.x до 17.0.2
- SeaMonkey до 2.15
Тип уязвимости
Спуфинг
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitIssue TrackingPatchVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
5 Medium
CVSS2
Дефекты
Связанные уязвимости
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x ...
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.
EPSS
5 Medium
CVSS2