Lucene search

K
mozillaMozilla FoundationMFSA2008-16
HistoryMar 25, 2008 - 12:00 a.m.

HTTP Referrer spoofing with malformed URLs — Mozilla

2008-03-2500:00:00
Mozilla Foundation
www.mozilla.org
24

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.009

Percentile

82.8%

Security researcher Gregory Fleischer demonstrated a problem with the HTTP Referer: (sic) header sent with requests to URLs containing Basic Authentication credentials with empty usernames. In these cases a number of leading characters, based on the length of the password in the URL, are removed from the referrer hostname. Fleischer pointed out that websites which only check the Referer: header to protect against Cross-Site Request Forgery (CSRF) could be attacked using this flaw. This concept was based on and expanded from a post to the sla.ckers.org forum by security researcher RSnake.

Affected configurations

Vulners
Node
mozillafirefoxRange<2.0.0.13
OR
mozillaseamonkeyRange<1.1.9
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.009

Percentile

82.8%