Cross-site Request Forgery (CSRF) Affecting Firefox package, versions [0,]


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UNMANAGED-FIREFOX-7654162
  • published 9 Aug 2024
  • disclosed 6 Aug 2024
  • credit Avi Lumelsky

Introduced: 6 Aug 2024

CVE NOT AVAILABLE CWE-352 Open this link in a new tab

How to fix?

There is no fixed version for Firefox.

Overview

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) against the 0.0.0.0 address, which is not included in the Private Network Access specification. Browser implementations that allow treating this address as a destination for requests may expose the application to DNS rebinding attacks or remote code execution. This is a common scenario because all traffic involving 0.0.0.0 is presumed to be local and therefore the same safeguards may not be in place as would be for a normal remote request. CORS protections do not strictly need to be bypassed because no response is needed for code execution to succeed.

Workarounds

This vulnerability can be avoided by various means including implementing PNA headers, CSRF tokens, HTTPS or host authorization checks - even for local requests.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
9.2 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    High
  • Integrity (VI)
    High
  • Availability (VA)
    High
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None