Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-7184

Опубликовано: 18 окт. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

РелизСтатусПримечание
devel

released

41.0.2+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [41.0.2+build2-0ubuntu0.14.04.1]]
precise

released

41.0.2+build2-0ubuntu0.12.04.1
trusty

released

41.0.2+build2-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [41.0.2+build2-0ubuntu0.14.04.1]
upstream

released

41.0.2
vivid

released

41.0.2+build2-0ubuntu0.15.04.1

Показывать по

EPSS

Процентиль: 40%
0.00179
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 9 лет назад

The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

nvd
больше 9 лет назад

The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

debian
больше 9 лет назад

The fetch API implementation in Mozilla Firefox before 41.0.2 does not ...

github
около 3 лет назад

The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

EPSS

Процентиль: 40%
0.00179
Низкий

6.8 Medium

CVSS2