CVE-2022-45411
Published: 16 November 2022
Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on <code>fetch()</code> and XMLHttpRequest; however some webservers have implemented non-standard headers such as <code>X-Http-Method-Override</code> that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Notes
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
mdeslaur | starting with Ubuntu 22.04, the firefox package is just a script that installs the Firefox snap |
Priority
Status
Package | Release | Status |
---|---|---|
mozjs78 Launchpad, Ubuntu, Debian |
kinetic |
Ignored
(end of life, was needs-triage)
|
bionic |
Does not exist
|
|
focal |
Does not exist
|
|
jammy |
Needs triage
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
lunar |
Needs triage
|
|
mantic |
Does not exist
|
|
firefox Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(107.0+build2-0ubuntu0.18.04.1)
|
focal |
Not vulnerable
|
|
jammy |
Not vulnerable
|
|
kinetic |
Not vulnerable
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Released
(107.0-1)
|
|
xenial |
Ignored
(end of standard support)
|
|
lunar |
Not vulnerable
|
|
mantic |
Not vulnerable
|
|
mozjs38 Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
focal |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
mozjs52 Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
focal |
Needs triage
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
mozjs68 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Needs triage
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
mozjs91 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
jammy |
Needs triage
|
|
trusty |
Does not exist
|
|
xenial |
Does not exist
|
|
kinetic |
Does not exist
|
|
upstream |
Needs triage
|
|
thunderbird Launchpad, Ubuntu, Debian |
bionic |
Released
(1:102.7.1+build2-0ubuntu0.18.04.1)
|
focal |
Released
(1:102.7.1+build2-0ubuntu0.20.04.1)
|
|
jammy |
Released
(1:102.7.1+build2-0ubuntu0.22.04.1)
|
|
kinetic |
Released
(1:102.7.1+build2-0ubuntu0.22.10.1)
|
|
xenial |
Ignored
(end of standard support)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Released
(1:102.5.0-1)
|
|
lunar |
Released
(1:102.7.1+build2-0ubuntu1)
|
|
mantic |
Released
(1:102.7.1+build2-0ubuntu1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411
- https://www.mozilla.org/en-US/security/advisories/mfsa2022-47/#CVE-2022-45411
- https://www.mozilla.org/en-US/security/advisories/mfsa2022-48/#CVE-2022-45411
- https://www.mozilla.org/en-US/security/advisories/mfsa2022-49/#CVE-2022-45411
- https://ubuntu.com/security/notices/USN-5726-1
- https://ubuntu.com/security/notices/USN-5824-1
- NVD
- Launchpad
- Debian