{"api_version":"1","generated_at":"2026-04-23T04:11:57+00:00","cve":"CVE-2022-45411","urls":{"html":"https://cve.report/CVE-2022-45411","api":"https://cve.report/api/cve/CVE-2022-45411.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-45411","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-45411"},"summary":{"title":"CVE-2022-45411","description":"Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on <code>fetch()</code> and XMLHttpRequest; however some webservers have implemented non-standard headers such as <code>X-Http-Method-Override</code> that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.","state":"PUBLIC","assigner":"security@mozilla.org","published_at":"2022-12-22 20:15:00","updated_at":"2023-01-04 14:34:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","name":"https://www.mozilla.org/security/advisories/mfsa2022-49/","refsource":"MISC","tags":[],"title":"Security Vulnerabilities fixed in Thunderbird 102.5 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","name":"https://www.mozilla.org/security/advisories/mfsa2022-48/","refsource":"MISC","tags":[],"title":"Security Vulnerabilities fixed in Firefox ESR 102.5 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790311","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790311","refsource":"MISC","tags":[],"title":"Access Denied","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","name":"https://www.mozilla.org/security/advisories/mfsa2022-47/","refsource":"MISC","tags":[],"title":"Security Vulnerabilities fixed in Firefox 107 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-45411","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45411","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"45411","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"45411","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"45411","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-45411","qid":"160260","title":"Oracle Enterprise Linux Security Update for firefox (ELSA-2022-8552)"},{"cve":"CVE-2022-45411","qid":"160261","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-8555)"},{"cve":"CVE-2022-45411","qid":"160319","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-8547)"},{"cve":"CVE-2022-45411","qid":"160321","title":"Oracle Enterprise Linux Security Update for firefox (ELSA-2022-8554)"},{"cve":"CVE-2022-45411","qid":"160325","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-8561)"},{"cve":"CVE-2022-45411","qid":"160326","title":"Oracle Enterprise Linux Security Update for firefox (ELSA-2022-8580)"},{"cve":"CVE-2022-45411","qid":"181222","title":"Debian Security Update for firefox-esr (DSA 5282-1)"},{"cve":"CVE-2022-45411","qid":"181226","title":"Debian Security Update for thunderbird (DLA 3196-1)"},{"cve":"CVE-2022-45411","qid":"181234","title":"Debian Security Update for firefox-esr (DLA 3199-1)"},{"cve":"CVE-2022-45411","qid":"181235","title":"Debian Security Update for thunderbird (DSA 5284-1)"},{"cve":"CVE-2022-45411","qid":"183021","title":"Debian Security Update for firefox-esrthunderbird (CVE-2022-45411)"},{"cve":"CVE-2022-45411","qid":"199028","title":"Ubuntu Security Notification for Firefox Vulnerabilities (USN-5726-1)"},{"cve":"CVE-2022-45411","qid":"199147","title":"Ubuntu Security Notification for Thunderbird Vulnerabilities (USN-5824-1)"},{"cve":"CVE-2022-45411","qid":"240928","title":"Red Hat Update for firefox (RHSA-2022:8554)"},{"cve":"CVE-2022-45411","qid":"240929","title":"Red Hat Update for thunderbird (RHSA-2022:8544)"},{"cve":"CVE-2022-45411","qid":"240930","title":"Red Hat Update for firefox (RHSA-2022:8552)"},{"cve":"CVE-2022-45411","qid":"240931","title":"Red Hat Update for firefox (RHSA-2022:8548)"},{"cve":"CVE-2022-45411","qid":"240932","title":"Red Hat Update for thunderbird (RHSA-2022:8545)"},{"cve":"CVE-2022-45411","qid":"240933","title":"Red Hat Update for firefox (RHSA-2022:8549)"},{"cve":"CVE-2022-45411","qid":"240934","title":"Red Hat Update for thunderbird (RHSA-2022:8555)"},{"cve":"CVE-2022-45411","qid":"240935","title":"Red Hat Update for thunderbird (RHSA-2022:8547)"},{"cve":"CVE-2022-45411","qid":"240936","title":"Red Hat Update for thunderbird (RHSA-2022:8561)"},{"cve":"CVE-2022-45411","qid":"240938","title":"Red Hat Update for firefox (RHSA-2022:8580)"},{"cve":"CVE-2022-45411","qid":"241004","title":"Red Hat Update for thunderbird (RHSA-2022:8980)"},{"cve":"CVE-2022-45411","qid":"241013","title":"Red Hat Update for firefox (RHSA-2022:8979)"},{"cve":"CVE-2022-45411","qid":"257202","title":"CentOS Security Update for firefox (CESA-2022:8552)"},{"cve":"CVE-2022-45411","qid":"257207","title":"CentOS Security Update for thunderbird (CESA-2022:8555)"},{"cve":"CVE-2022-45411","qid":"296098","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 52.132.2 Missing (CPUOCT2022)"},{"cve":"CVE-2022-45411","qid":"356268","title":"Amazon Linux Security Advisory for firefox : ALASFIREFOX-2023-009"},{"cve":"CVE-2022-45411","qid":"377768","title":"Mozilla Firefox Multiple Vulnerabilities (MFSA2022-47)"},{"cve":"CVE-2022-45411","qid":"377769","title":"Mozilla Thunderbird Multiple Vulnerabilities (MFSA2022-49)"},{"cve":"CVE-2022-45411","qid":"377770","title":"Mozilla Firefox ESR Multiple Vulnerabilities (MFSA2022-48)"},{"cve":"CVE-2022-45411","qid":"503452","title":"Alpine Linux Security Update for firefox-esr"},{"cve":"CVE-2022-45411","qid":"506060","title":"Alpine Linux Security Update for firefox-esr"},{"cve":"CVE-2022-45411","qid":"710686","title":"Gentoo Linux Mozilla Firefox Multiple Vulnerabilities (GLSA 202211-06)"},{"cve":"CVE-2022-45411","qid":"710687","title":"Gentoo Linux Mozilla Thunderbird Multiple Vulnerabilities (GLSA 202211-05)"},{"cve":"CVE-2022-45411","qid":"752829","title":"SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2022:4058-1)"},{"cve":"CVE-2022-45411","qid":"752832","title":"SUSE Enterprise Linux Security Update for MozillaThunderbird (SUSE-SU-2022:4085-1)"},{"cve":"CVE-2022-45411","qid":"752879","title":"SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2022:4247-1)"},{"cve":"CVE-2022-45411","qid":"752924","title":"SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2022:4083-1)"},{"cve":"CVE-2022-45411","qid":"940845","title":"AlmaLinux Security Update for thunderbird (ALSA-2022:8547)"},{"cve":"CVE-2022-45411","qid":"940846","title":"AlmaLinux Security Update for firefox (ALSA-2022:8554)"},{"cve":"CVE-2022-45411","qid":"940847","title":"AlmaLinux Security Update for thunderbird (ALSA-2022:8561)"},{"cve":"CVE-2022-45411","qid":"940848","title":"AlmaLinux Security Update for firefox (ALSA-2022:8580)"},{"cve":"CVE-2022-45411","qid":"960181","title":"Rocky Linux Security Update for thunderbird (RLSA-2022:8547)"},{"cve":"CVE-2022-45411","qid":"960507","title":"Rocky Linux Security Update for firefox (RLSA-2022:8554)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-45411","ASSIGNER":"security@mozilla.org","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Mozilla","product":{"product_data":[{"product_name":"Firefox ESR","version":{"version_data":[{"version_value":"102.5","version_affected":"<"}]}},{"product_name":"Thunderbird","version":{"version_data":[{"version_value":"102.5","version_affected":"<"}]}},{"product_name":"Firefox","version":{"version_data":[{"version_value":"107","version_affected":"<"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Cross-Site Tracing was possible via non-standard override headers"}]}]},"references":{"reference_data":[{"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790311","refsource":"MISC","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790311"}]},"description":{"description_data":[{"lang":"eng","value":"Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on <code>fetch()</code> and XMLHttpRequest; however some webservers have implemented non-standard headers such as <code>X-Http-Method-Override</code> that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107."}]}},"nvd":{"publishedDate":"2022-12-22 20:15:00","lastModifiedDate":"2023-01-04 14:34:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndExcluding":"107.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","versionEndExcluding":"102.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionEndExcluding":"102.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}