The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://linux.oracle.com/errata/ELSA-2015-0046.html - | |
References | () http://linux.oracle.com/errata/ELSA-2015-0047.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-0046.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-0047.html - | |
References | () http://secunia.com/advisories/62237 - | |
References | () http://secunia.com/advisories/62242 - | |
References | () http://secunia.com/advisories/62250 - | |
References | () http://secunia.com/advisories/62253 - | |
References | () http://secunia.com/advisories/62259 - | |
References | () http://secunia.com/advisories/62273 - | |
References | () http://secunia.com/advisories/62274 - | |
References | () http://secunia.com/advisories/62283 - | |
References | () http://secunia.com/advisories/62293 - | |
References | () http://secunia.com/advisories/62304 - | |
References | () http://secunia.com/advisories/62313 - | |
References | () http://secunia.com/advisories/62315 - | |
References | () http://secunia.com/advisories/62316 - | |
References | () http://secunia.com/advisories/62418 - | |
References | () http://secunia.com/advisories/62446 - | |
References | () http://secunia.com/advisories/62657 - | |
References | () http://secunia.com/advisories/62790 - | |
References | () http://www.debian.org/security/2015/dsa-3127 - | |
References | () http://www.debian.org/security/2015/dsa-3132 - | |
References | () http://www.mozilla.org/security/announce/2014/mfsa2015-03.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html - | |
References | () http://www.securityfocus.com/bid/72047 - | |
References | () http://www.securitytracker.com/id/1031533 - | |
References | () http://www.securitytracker.com/id/1031534 - | |
References | () http://www.ubuntu.com/usn/USN-2460-1 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1080987 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/99958 - | |
References | () https://security.gentoo.org/glsa/201504-01 - |
21 Oct 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:* |
21 Oct 2024, 13:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:* |
Information
Published : 2015-01-14 11:59
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8638
Mitre link : CVE-2014-8638
CVE.ORG link : CVE-2014-8638
JSON object : View
Products Affected
mozilla
- seamonkey
- firefox
- firefox_esr
- thunderbird
CWE
CWE-352
Cross-Site Request Forgery (CSRF)