Mozilla Firefox through 27 sends HTTP Cookie headers without first validating that they have the required character-set restrictions, which allows remote attackers to conduct the equivalent of a persistent Logout CSRF attack via a crafted parameter that forces a web application to set a malformed cookie within an HTTP response.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 27.0 (including) |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | lucid | * |
Firefox | Ubuntu | precise | * |
Firefox | Ubuntu | quantal | * |
Firefox | Ubuntu | raring | * |
Firefox | Ubuntu | saucy | * |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | utopic | * |
Firefox | Ubuntu | vivid | * |
Firefox | Ubuntu | wily | * |
Firefox | Ubuntu | xenial | * |
Firefox | Ubuntu | yakkety | * |
Seamonkey | Ubuntu | lucid | * |
Seamonkey | Ubuntu | upstream | * |
Thunderbird | Ubuntu | devel | * |
Thunderbird | Ubuntu | lucid | * |
Thunderbird | Ubuntu | precise | * |
Thunderbird | Ubuntu | quantal | * |
Thunderbird | Ubuntu | raring | * |
Thunderbird | Ubuntu | saucy | * |
Thunderbird | Ubuntu | trusty | * |
Thunderbird | Ubuntu | upstream | * |
Thunderbird | Ubuntu | utopic | * |
Thunderbird | Ubuntu | vivid | * |
Thunderbird | Ubuntu | wily | * |
Thunderbird | Ubuntu | xenial | * |
Thunderbird | Ubuntu | yakkety | * |
Xulrunner-1.9.2 | Ubuntu | lucid | * |
Xulrunner-1.9.2 | Ubuntu | upstream | * |