CVE-2009-1699

The XSL stylesheet implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle XML external entities, which allows remote attackers to read arbitrary files via a crafted DTD, as demonstrated by a file:///etc/passwd URL in an entity declaration, related to an "XXE attack."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*

History

10 Feb 2024, 02:48

Type Values Removed Values Added
CWE CWE-200 CWE-611
First Time Opensuse
Canonical
Canonical ubuntu Linux
Opensuse opensuse
CPE cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
References (OSVDB) http://osvdb.org/54972 - (OSVDB) http://osvdb.org/54972 - Broken Link
References (APPLE) http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - (APPLE) http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - Mailing List
References (BID) http://www.securityfocus.com/bid/35260 - Exploit (BID) http://www.securityfocus.com/bid/35260 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/43068 - (SECUNIA) http://secunia.com/advisories/43068 - Broken Link
References (SECUNIA) http://secunia.com/advisories/35379 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/35379 - Broken Link, Vendor Advisory
References (APPLE) http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Patch, Vendor Advisory (APPLE) http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Broken Link, Mailing List, Patch, Vendor Advisory
References (CONFIRM) http://support.apple.com/kb/HT3639 - (CONFIRM) http://support.apple.com/kb/HT3639 - Vendor Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-857-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-857-1 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - Mailing List
References (VUPEN) http://www.vupen.com/english/advisories/2011/0212 - (VUPEN) http://www.vupen.com/english/advisories/2011/0212 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2009/1621 - (VUPEN) http://www.vupen.com/english/advisories/2009/1621 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2009/1522 - Patch, Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2009/1522 - Broken Link, Patch, Vendor Advisory
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/8907 - (EXPLOIT-DB) https://www.exploit-db.com/exploits/8907 - Exploit, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/35321 - (BID) http://www.securityfocus.com/bid/35321 - Broken Link, Third Party Advisory, VDB Entry
CVSS v2 : 7.1
v3 : unknown
v2 : 7.1
v3 : 7.5

Information

Published : 2009-06-10 18:00

Updated : 2024-02-28 11:21


NVD link : CVE-2009-1699

Mitre link : CVE-2009-1699

CVE.ORG link : CVE-2009-1699


JSON object : View

Products Affected

apple

  • iphone_os
  • safari

canonical

  • ubuntu_linux

opensuse

  • opensuse
CWE
CWE-611

Improper Restriction of XML External Entity Reference