Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-8639


Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.


Published

2015-01-14T11:59:07.930

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mozilla seamonkey ≤ 2.31 Yes
Application mozilla firefox ≤ 34.0.5 Yes
Application mozilla firefox 31.0 Yes
Application mozilla firefox 31.1.0 Yes
Application mozilla firefox 31.1.1 Yes
Application mozilla firefox 31.3.0 Yes
Application mozilla firefox_esr 31.2 Yes
Application mozilla thunderbird ≤ 31.3.0 Yes

References