Search for vulnerabilities
Vulnerability details: VCID-mv7v-5r9s-z7ef
Vulnerability ID VCID-mv7v-5r9s-z7ef
Aliases CVE-2023-6209
Summary Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal "/../" part in the path could be used to override the specified host. This could contribute to security problems in web sites.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 6.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json
epss 0.00381 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
epss 0.00431 https://api.first.org/data/v1/epss?cve=CVE-2023-6209
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2023-6209
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json
https://api.first.org/data/v1/epss?cve=CVE-2023-6209
https://bugzilla.mozilla.org/show_bug.cgi?id=1858570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
2250901 https://bugzilla.redhat.com/show_bug.cgi?id=2250901
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
CVE-2023-6209 https://nvd.nist.gov/vuln/detail/CVE-2023-6209
mfsa2023-49 https://www.mozilla.org/en-US/security/advisories/mfsa2023-49
mfsa2023-50 https://www.mozilla.org/en-US/security/advisories/mfsa2023-50
mfsa2023-52 https://www.mozilla.org/en-US/security/advisories/mfsa2023-52
RHSA-2023:7499 https://access.redhat.com/errata/RHSA-2023:7499
RHSA-2023:7500 https://access.redhat.com/errata/RHSA-2023:7500
RHSA-2023:7501 https://access.redhat.com/errata/RHSA-2023:7501
RHSA-2023:7502 https://access.redhat.com/errata/RHSA-2023:7502
RHSA-2023:7503 https://access.redhat.com/errata/RHSA-2023:7503
RHSA-2023:7504 https://access.redhat.com/errata/RHSA-2023:7504
RHSA-2023:7505 https://access.redhat.com/errata/RHSA-2023:7505
RHSA-2023:7506 https://access.redhat.com/errata/RHSA-2023:7506
RHSA-2023:7507 https://access.redhat.com/errata/RHSA-2023:7507
RHSA-2023:7508 https://access.redhat.com/errata/RHSA-2023:7508
RHSA-2023:7509 https://access.redhat.com/errata/RHSA-2023:7509
RHSA-2023:7510 https://access.redhat.com/errata/RHSA-2023:7510
RHSA-2023:7511 https://access.redhat.com/errata/RHSA-2023:7511
RHSA-2023:7512 https://access.redhat.com/errata/RHSA-2023:7512
RHSA-2023:7547 https://access.redhat.com/errata/RHSA-2023:7547
RHSA-2023:7569 https://access.redhat.com/errata/RHSA-2023:7569
RHSA-2023:7570 https://access.redhat.com/errata/RHSA-2023:7570
RHSA-2023:7573 https://access.redhat.com/errata/RHSA-2023:7573
RHSA-2023:7574 https://access.redhat.com/errata/RHSA-2023:7574
RHSA-2023:7577 https://access.redhat.com/errata/RHSA-2023:7577
USN-6509-1 https://usn.ubuntu.com/6509-1/
USN-6515-1 https://usn.ubuntu.com/6515-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-6209
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.58754
EPSS Score 0.00381
Published At Aug. 16, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:09:34.869274+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2023/mfsa2023-50.yml 37.0.0