// For flags

CVE-2013-6167

Mozilla Firefox - Cookie Verification Denial of Service

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC (-)
Risk
CVSS Score
7.5 High
SSVC
-
KEV
-
EPSS
0.5%
Affected Products (-)
Vendors (1)
mozilla
Products (1)
firefox
Versions (1)
<= 27.0
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (6)
General (4)
lighttpd, seclists, openwall
Exploits & POcs (1)
exploit-db
Patches (-)
Advisories (1)
mozilla
Summary
Descriptions

Mozilla Firefox through 27 sends HTTP Cookie headers without first validating that they have the required character-set restrictions, which allows remote attackers to conduct the equivalent of a persistent Logout CSRF attack via a crafted parameter that forces a web application to set a malformed cookie within an HTTP response.

Mozilla Firefox hasta 27 envía cabeceras HTTP Cookie sin antes validar que tiene las restricciones character-set necesarias, lo que permite a atacantes remotos realizar el equivalente a un ataque de Logout CSRF persistente a través de un parámetro manipulado que obliga una aplicación web a configurar una cookie malformado dentro de una respuesta HTTP.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-04-04 First Exploit
  • 2013-10-16 CVE Reserved
  • 2014-02-15 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-09-02 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
Threat Intelligence Resources (0)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 27.0
Search vendor "Mozilla" for product "Firefox" and version " <= 27.0"
-
Affected