Mozilla Firefox Referer Header Spoofing Bug Permits Cross-Site Request Forgery Attacks
|
SecurityTracker Alert ID: 1018995 |
SecurityTracker URL: http://securitytracker.com/id/1018995
|
CVE Reference:
CVE-2007-5960
(Links to External Site)
|
Date: Nov 27 2007
|
Impact:
Modification of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): prior to 2.0.0.10
|
Description:
A vulnerability was reported in Mozilla Firefox. A remote user can conduct cross-site request forgery attacks.
A remote user can exploit a race condition when setting the 'window.location' property to spoof the HTTP Referer header value. This allows the remote user to potentially cause scripting code to be executed in a window (or a frame), where the Referer value is set to the URI of the window instead of the calling page.
This can be used to bypass a web site's Referer checks.
Gregory Fleischer reported this vulnerability.
|
Impact:
A remote user can bypass a web site's HTTP Referer checks in certain cases.
|
Solution:
The vendor has issued a fixed version (2.0.0.10).
The Mozilla advisory is available at:
http://www.mozilla.org/security/announce/2007/mfsa2007-39.html
|
Vendor URL: www.mozilla.org/security/announce/2007/mfsa2007-39.html (Links to External Site)
|
Cause:
State error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|