6.8

CVE-2015-0807

The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.

Data is provided by the National Vulnerability Database (NVD)
MozillaFirefox Version <= 36.0.4
MozillaFirefox Version31.0
MozillaFirefox Version31.1.0
MozillaFirefox Version31.1.1
MozillaFirefox Version31.3.0
MozillaFirefox Version31.5.1
MozillaFirefox Version31.5.2
MozillaFirefox Version31.5.3
MozillaFirefox ESR Version31.1
MozillaFirefox ESR Version31.2
MozillaFirefox ESR Version31.3
MozillaFirefox ESR Version31.4
MozillaFirefox ESR Version31.5
MozillaThunderbird Version <= 31.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.14% 0.302
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.