Mozilla has released Firefox 184.108.40.206 to fix several security flaws attackers could have exploited to conduct cross-site request forgery attacks and potentially hijack a user's computer.
Mozilla Foundation Security Advisory 2007-39 said it was possible to generate a fake HTTP referer header by exploiting a timing condition when setting the "window.location" property and that attackers could have exploited it to conduct a cross-site request forgery attack against Web sites that rely only on the referer header as protection against such attacks.
"When navigation occurs due to setting window.location, the referer header is supposed to reflect the address of the content which initiated the script," Mozilla said. "Instead, the referer was set to the address of the window (or frame) in which the script was running."
Danish vulnerability clearinghouse Secunia described the problem in its SA27725 advisory as a race condition when setting the "window.location" property, and that attackers could exploit it to generate a fake HTTP Referer header, which could then be used to conduct cross-site request forgery attacks.