SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
Mozilla Firefox HTTPOnly Enforcement Flaw Lets Users Access Cookies
SecurityTracker Alert ID:  1021668
SecurityTracker URL:  http://securitytracker.com/id/1021668
CVE Reference:   CVE-2009-0357   (Links to External Site)
Date:  Feb 4 2009
Impact:   Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.0.5 and prior versions
Description:   A vulnerability was reported in Mozilla Firefox. A remote user may be able to obtain cookies in certain cases.

A remote user can create HTML that invokes the XMLHttpRequest.getResponseHeader and XMLHttpRequest.getAllResponseHeaders APIs to bypass the HTTPOnly flag and access cookies on the target user's browser.

SeaMonkey is also affected.

Wladimir Palant reported this vulnerability.

Impact:   A remote user may be able to obtain cookies in certain cases.
Solution:   The vendor has issued a fix (3.0.6).

The vendor's advisory is available at:

http://www.mozilla.org/security/announce/2009/mfsa2009-05.html

Vendor URL:  www.mozilla.org/security/announce/2009/mfsa2009-05.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 4 2009 (Red Hat Issues Fix) Mozilla Firefox HTTPOnly Enforcement Flaw Lets Users Access Cookies
Red Hat has released a fix for Red Hat Enterprise Linux 4 and 5.
Feb 4 2009 (Red Hat Issues Fix for SeaMonkey) Mozilla Firefox HTTPOnly Enforcement Flaw Lets Users Access Cookies
Red Hat has released a fix for Mozilla SeaMonkey for Red Hat Enterprise Linux 2.1, 3, and 4.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC