Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2015-7193


Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.


Published

2015-11-05T05:59:17.263

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-254

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mozilla firefox 38.0 Yes
Application mozilla firefox 38.0.1 Yes
Application mozilla firefox 38.0.5 Yes
Application mozilla firefox 38.1.0 Yes
Application mozilla firefox 38.1.1 Yes
Application mozilla firefox 38.2.0 Yes
Application mozilla firefox 38.2.1 Yes
Application mozilla firefox 38.3.0 Yes
Application mozilla firefox ≤ 41.0.2 Yes

References