CVE-2015-0807Cross-Site Request Forgery in Mozilla Firefox

Severity
6.8MEDIUMNVD
OSV7.5
EPSS
0.1%
top 66.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1
Latest updateMay 17

Description

The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages5 packages

Ubuntumozilla/firefox< 37.0+build2-0ubuntu0.14.04.1
NVDmozilla/firefox36.0.4+7
NVDmozilla/firefox_esr5 versions+4
Ubuntumozilla/thunderbird< 1:31.6.0+build1-0ubuntu0.14.04.1

🔴Vulnerability Details

4
GHSA
GHSA-h77x-2hj5-ggjw: The navigator2022-05-17
OSV
thunderbird vulnerabilities2015-04-02
OSV
firefox vulnerabilities2015-04-01
OSV
CVE-2015-0807: The navigator2015-04-01

📋Vendor Advisories

3
Ubuntu
Thunderbird vulnerabilities2015-04-02
Ubuntu
Firefox vulnerabilities2015-04-01
Red Hat
Mozilla: CORS requests should not follow 30x redirections after preflight (MFSA 2015-37)2015-03-31

💬Community

1
Bugzilla
CVE-2015-0807 Mozilla: CORS requests should not follow 30x redirections after preflight (MFSA 2015-37)2015-03-30