Lucene search

K
mozillaMozilla FoundationMFSA2007-31
HistoryOct 18, 2007 - 12:00 a.m.

Digest authentication request splitting — Mozilla

2007-10-1800:00:00
Mozilla Foundation
www.mozilla.org
27

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.089

Percentile

94.6%

Security researcher Stefano Di Paola reported that Firefox did not properly validate the user ID when making an HTTP request using Digest Authentication to log into a web site. A malicious page could abuse this to inject arbitrary HTTP headers by including a newline character in the user ID followed by the injected header data. If the user were connecting through a proxy the attacker could inject headers that a proxy would interpret as two separate requests for different hosts.

Affected configurations

Vulners
Node
mozillafirefoxRange<2.0.0.8
OR
mozillaseamonkeyRange<1.1.5

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.089

Percentile

94.6%