Vulnerability Name: | CVE-2022-45411 (CCN-240141) | ||||||||||||||||||||||||||||||||
Assigned: | 2022-11-15 | ||||||||||||||||||||||||||||||||
Published: | 2022-11-15 | ||||||||||||||||||||||||||||||||
Updated: | 2023-01-04 | ||||||||||||||||||||||||||||||||
Summary: | Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on <code>fetch()</code> and XMLHttpRequest; however some webservers have implemented non-standard headers such as <code>X-Http-Method-Override</code> that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
6.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:H/RL:O/RC:C)
5.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-45411 Source: security@mozilla.org Type: Issue Tracking, Permissions Required, Vendor Advisory security@mozilla.org Source: XF Type: UNKNOWN mozilla-firefox-cve202245411-xss(240141) Source: CCN Type: IBM Security Bulletin 6849101 (Application Performance Management) Multiple vulnerabilities of Mozilla Firefox (less than Firefox 102.5ESR) have affected Synthetic Playback Agent 8.1.4.0-8.1.4 IF16 Source: CCN Type: Mozilla Foundation Security Advisory 2022-47 Security Vulnerabilities fixed in Firefox 107 Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |