First published: Wed Apr 01 2015(Updated: )
The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <=36.0.4 | |
Firefox | =31.0 | |
Firefox | =31.1.0 | |
Firefox | =31.1.1 | |
Firefox | =31.3.0 | |
Firefox | =31.5.1 | |
Firefox | =31.5.2 | |
Firefox | =31.5.3 | |
Firefox ESR | =31.1 | |
Firefox ESR | =31.2 | |
Firefox ESR | =31.3 | |
Firefox ESR | =31.4 | |
Firefox ESR | =31.5 | |
Thunderbird | <=31.5 | |
Firefox ESR | =31.0 | |
Firefox ESR | =31.1.0 | |
Firefox ESR | =31.1.1 | |
Firefox ESR | =31.3.0 | |
Firefox ESR | =31.5.1 | |
Firefox ESR | =31.5.2 | |
Firefox ESR | =31.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0807 has been assigned a medium severity rating due to the potential for remote attackers to bypass CORS access control checks.
To fix CVE-2015-0807, update Mozilla Firefox to version 37.0 or later, or to Firefox ESR version 31.6 or later.
Versions of Mozilla Firefox below 37.0, Firefox ESR versions before 31.6, and Thunderbird versions before 31.6 are affected by CVE-2015-0807.
CVE-2015-0807 allows remote attackers to bypass intended CORS access-control checks through the misuse of HTTP 30x status codes.
CVE-2015-0807 affects Mozilla Firefox, Firefox ESR, and Thunderbird applications running specified vulnerable versions.