WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not enforce the HTTP Strict Transport Security (HSTS) protection mechanism for Content Security Policy (CSP) report requests, which allows man-in-the-middle attackers to obtain sensitive information by sniffing the network or spoof a report by modifying the client-server data stream.
References
Configurations
History
21 Nov 2024, 02:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html - Mailing List, Vendor Advisory | |
References | () http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html - Mailing List, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/76341 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1033274 - Third Party Advisory, VDB Entry | |
References | () https://support.apple.com/kb/HT205030 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT205033 - Vendor Advisory |
Information
Published : 2015-08-16 23:59
Updated : 2024-11-21 02:29
NVD link : CVE-2015-3750
Mitre link : CVE-2015-3750
CVE.ORG link : CVE-2015-3750
JSON object : View
Products Affected
apple
- iphone_os
- safari
CWE
CWE-254
7PK - Security Features