Lucene search

K
cveMozillaCVE-2014-8639
HistoryJan 14, 2015 - 11:59 a.m.

CVE-2014-8639

2015-01-1411:59:07
mozilla
web.nvd.nist.gov
54
cve-2014-8639
mozilla firefox
firefox esr
thunderbird
seamonkey
session fixation
http proxy
nvd

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

9.2

Confidence

High

EPSS

0.018

Percentile

88.3%

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.

Affected configurations

Nvd
Node
mozillaseamonkeyRange2.31
Node
mozillafirefoxRange34.0.5
Node
mozillafirefox_esrMatch31.0
OR
mozillafirefox_esrMatch31.1.0
OR
mozillafirefox_esrMatch31.1.1
OR
mozillafirefox_esrMatch31.2
OR
mozillafirefox_esrMatch31.3.0
Node
mozillathunderbirdRange31.3.0
VendorProductVersionCPE
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillafirefox_esr31.0cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*
mozillafirefox_esr31.1.0cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*
mozillafirefox_esr31.1.1cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*
mozillafirefox_esr31.2cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*
mozillafirefox_esr31.3.0cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

References

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

9.2

Confidence

High

EPSS

0.018

Percentile

88.3%