CVE-2013-6167

Mozilla Firefox < 27.0 - CSRF

Title source: rule
STIX 2.1

Description

Mozilla Firefox through 27 sends HTTP Cookie headers without first validating that they have the required character-set restrictions, which allows remote attackers to conduct the equivalent of a persistent Logout CSRF attack via a crafted parameter that forces a web application to set a malformed cookie within an HTTP response.

Exploits (1)

exploitdb WRITEUP VERIFIED
by anonymous · textdosmultiple
https://www.exploit-db.com/exploits/38798

References (5)

Core 5
Core References
Mailing List mailing-list x_refsource_mlist
http://seclists.org/oss-sec/2013/q4/121
Vendor Advisory x_refsource_confirm
https://bugzilla.mozilla.org/show_bug.cgi?id=858215
Mailing List mailing-list x_refsource_mlist
http://seclists.org/oss-sec/2013/q4/117
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2013/04/03/10
Issue Tracking x_refsource_misc
http://redmine.lighttpd.net/issues/2188

Scores

EPSS 0.0044
EPSS Percentile 63.3%

Details

CWE
CWE-352
Status published
Products (1)
mozilla/firefox < 27.0
Published Feb 15, 2014
Tracked Since Feb 18, 2026