[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Cross-Site Tracing was possible via non-standard override headers - CVE-2022-45411

ID: oval:org.secpod.oval:def:85600Date: (C)2022-11-16   (M)2023-11-19
Class: VULNERABILITYFamily: macos




Mozilla Firefox 107, Mozilla Firefox ESR 102.5 or Mozilla Thunderbird 102.5: Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on codefetch()/code and XMLHttpRequest; however some webservers have implemented non-standard headers such as codeX-Http-Method-Override/code that override the HTTP method, and made this attack possible again. Firefox has applied the same mitigations to the use of this and similar headers.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X 10.11
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X 10.14
Apple Mac OS X 10.15
Apple Mac OS 11
Apple Mac OS 12
Product:
Mozilla Firefox
Mozilla Firefox ESR
Mozilla Thunderbird
Reference:
CVE-2022-45411
CVE    1
CVE-2022-45411
CPE    3
cpe:/a:mozilla:firefox_esr
cpe:/a:mozilla:thunderbird
cpe:/a:mozilla:firefox

© SecPod Technologies