CVE-2007-5960
CVSS V2 Medium 4.3
CVSS V3 None
Description
Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent.
Overview
- CVE ID
- CVE-2007-5960
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Modified
- Published Version
- 2007-11-26T23:46:00
- Last Modified Date
- 2023-02-13T02:18:32
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* | 1 | OR | 1.1.7 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 4.3
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 2.9
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2007-5960 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 18:19:45 | Added to TrackCVE | |||
2023-02-02 21:01:50 | 2023-02-02T19:15:29 | CVE Modified Date | updated | |
2023-02-02 21:01:51 | Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent. | CVE-2007-5960 Mozilla Cross-site Request Forgery flaw | Description | updated |
2023-02-13 03:02:17 | 2023-02-13T02:18:32 | CVE Modified Date | updated | |
2023-02-13 03:02:19 | CVE-2007-5960 Mozilla Cross-site Request Forgery flaw | Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent. | Description | updated |