Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-0807

Опубликовано: 01 апр. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.

РелизСтатусПримечание
devel

released

37.0+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [37.0+build2-0ubuntu0.14.04.1]]
lucid

ignored

end of life
precise

released

37.0+build2-0ubuntu0.12.04.1
trusty

released

37.0+build2-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [37.0+build2-0ubuntu0.14.04.1]
upstream

released

37.0
utopic

released

37.0+build2-0ubuntu0.14.10.1

Показывать по

РелизСтатусПримечание
devel

released

1:31.6.0+build1-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1:31.6.0+build1-0ubuntu0.14.04.1]]
lucid

ignored

end of life
precise

released

1:31.6.0+build1-0ubuntu0.12.04.1
trusty

released

1:31.6.0+build1-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [1:31.6.0+build1-0ubuntu0.14.04.1]
upstream

released

31.6.0
utopic

released

1:31.6.0+build1-0ubuntu0.14.10.1

Показывать по

EPSS

Процентиль: 34%
0.00137
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.

nvd
больше 10 лет назад

The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.

debian
больше 10 лет назад

The navigator.sendBeacon implementation in Mozilla Firefox before 37.0 ...

github
больше 3 лет назад

The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.

fstec
больше 10 лет назад

Уязвимость почтового клиента Thunderbird, позволяющая удалённому злоумышленнику подделать межсайтовые запросы

EPSS

Процентиль: 34%
0.00137
Низкий

6.8 Medium

CVSS2