CVE-2013-6167 : Detail

CVE-2013-6167

Cross-Site Request Forgery - CSRF
A01-Broken Access Control
0.43%V3
Network
2014-02-15
10h00 +00:00
2014-02-15
05h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Mozilla Firefox through 27 sends HTTP Cookie headers without first validating that they have the required character-set restrictions, which allows remote attackers to conduct the equivalent of a persistent Logout CSRF attack via a crafted parameter that forces a web application to set a malformed cookie within an HTTP response.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 38798

Publication date : 2013-04-03 22h00 +00:00
Author : anonymous
EDB Verified : Yes

source: https://www.securityfocus.com/bid/62969/info Mozilla Firefox is prone to a denial-of-service vulnerability because it fails to verify the user supplied input. Successfully exploiting this issue will allow an attacker to inject special characters into the browser's local cookie storage, resulting in the requested website always responding with an error message which is hosted on specific web server software (like lighttpd). This will cause a denial-of-service condition. Firefox 19 is vulnerable; other versions may also be affected. Note: This issue was previously covered in BID 58857 (Google Chrome and Mozilla Firefox Browser Cookie Verification Security Weakness), but has been moved to its own record for better documentation. http://www.example.com/?utm_source=test&utm_medium=test&utm_campaign=te%05st

Products Mentioned

Configuraton 0

Mozilla>>Firefox >> Version To (including) 27.0

References

http://seclists.org/oss-sec/2013/q4/121
Tags : mailing-list, x_refsource_MLIST
http://seclists.org/oss-sec/2013/q4/117
Tags : mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2013/04/03/10
Tags : mailing-list, x_refsource_MLIST