Cross-Site Tracing was possible via non-standard override headers - CVE-2022-45411ID: oval:org.secpod.oval:def:85600 | Date: (C)2022-11-16 (M)2023-11-19 |
Class: VULNERABILITY | Family: macos |
Mozilla Firefox 107, Mozilla Firefox ESR 102.5 or Mozilla Thunderbird 102.5: Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on codefetch()/code and XMLHttpRequest; however some webservers have implemented non-standard headers such as codeX-Http-Method-Override/code that override the HTTP method, and made this attack possible again. Firefox has applied the same mitigations to the use of this and similar headers.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.15 |
Apple Mac OS 11 |
Apple Mac OS 12 |
Product: |
Mozilla Firefox |
Mozilla Firefox ESR |
Mozilla Thunderbird |