Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.avaya.com/css/P8/documents/100133195 - | |
References | () http://support.avaya.com/css/P8/documents/100128655 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:041 - | |
References | () http://www.mozilla.org/security/announce/2011/mfsa2011-10.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0313.html - | |
References | () http://www.securityfocus.com/bid/46652 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=573873 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14473 - |
Information
Published : 2011-03-02 20:00
Updated : 2024-11-21 01:23
NVD link : CVE-2011-0059
Mitre link : CVE-2011-0059
CVE.ORG link : CVE-2011-0059
JSON object : View
Products Affected
mozilla
- seamonkey
- firefox
CWE
CWE-352
Cross-Site Request Forgery (CSRF)