Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-8639

Опубликовано: 13 янв. 2015
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-88
https://bugzilla.redhat.com/show_bug.cgi?id=1180967Mozilla: Cookie injection through Proxy Authenticate responses (MFSA 2015-04)

EPSS

Процентиль: 80%
0.01476
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.

nvd
больше 10 лет назад

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.

debian
больше 10 лет назад

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird ...

github
больше 3 лет назад

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.

oracle-oval
больше 10 лет назад

ELSA-2015-0047: thunderbird security update (IMPORTANT)

EPSS

Процентиль: 80%
0.01476
Низкий

4.3 Medium

CVSS2