Session Fixation Vulnerability in Mozilla Firefox, Firefox ESR, Thunderbird, and SeaMonkey

Session Fixation Vulnerability in Mozilla Firefox, Firefox ESR, Thunderbird, and SeaMonkey

CVE-2014-8639 · MEDIUM Severity

AV:N/AC:M/AU:N/C:P/I:P/A:P

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.

Learn more about our Cis Benchmark Audit For Server Software.