Data in the body of XHR HEAD requests leads to CSRF attacks
- June 25, 2013
- Johnathan Kuskos
- Firefox, Firefox ESR, SeaMonkey, Thunderbird, Thunderbird ESR
- Fixed in
- Firefox 22
- Firefox ESR 17.0.7
- SeaMonkey 2.19
- Thunderbird 17.0.7
- Thunderbird ESR 17.0.7
Security researcher Johnathan Kuskos reported that Firefox is sending data in the body of XMLHttpRequest (XHR) HEAD requests, which goes agains the XHR specification. This can potentially be used for Cross-Site Request Forgery (CSRF) attacks against sites which do not distinguish between HEAD and POST requests.
In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.