The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | 31.0 (including) | 31.0 (including) |
Firefox | Mozilla | 31.1.0 (including) | 31.1.0 (including) |
Firefox | Mozilla | 31.1.1 (including) | 31.1.1 (including) |
Firefox | Mozilla | 31.3.0 (including) | 31.3.0 (including) |
Firefox_esr | Mozilla | 31.2 (including) | 31.2 (including) |
Red Hat Enterprise Linux 5 | RedHat | firefox-0:31.4.0-1.el5_11 | * |
Red Hat Enterprise Linux 5 | RedHat | thunderbird-0:31.4.0-1.el5_11 | * |
Red Hat Enterprise Linux 6 | RedHat | firefox-0:31.4.0-1.el6_6 | * |
Red Hat Enterprise Linux 6 | RedHat | thunderbird-0:31.4.0-1.el6_6 | * |
Red Hat Enterprise Linux 7 | RedHat | firefox-0:31.4.0-1.el7_0 | * |
Red Hat Enterprise Linux 7 | RedHat | xulrunner-0:31.4.0-1.el7_0 | * |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | lucid | * |
Firefox | Ubuntu | precise | * |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | utopic | * |
Thunderbird | Ubuntu | devel | * |
Thunderbird | Ubuntu | lucid | * |
Thunderbird | Ubuntu | precise | * |
Thunderbird | Ubuntu | trusty | * |
Thunderbird | Ubuntu | upstream | * |
Thunderbird | Ubuntu | utopic | * |