CVE-2015-3753

WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly perform taint checking for CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive image data by leveraging a redirect to a data:image resource.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:29

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html - Mailing List, Vendor Advisory () http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html - Mailing List, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html - Mailing List, Vendor Advisory () http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html - Mailing List, Vendor Advisory
References () http://www.securityfocus.com/bid/76341 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/76341 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1033274 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1033274 - Third Party Advisory, VDB Entry
References () https://support.apple.com/kb/HT205030 - Vendor Advisory () https://support.apple.com/kb/HT205030 - Vendor Advisory
References () https://support.apple.com/kb/HT205033 - Vendor Advisory () https://support.apple.com/kb/HT205033 - Vendor Advisory

Information

Published : 2015-08-16 23:59

Updated : 2024-11-21 02:29


NVD link : CVE-2015-3753

Mitre link : CVE-2015-3753

CVE.ORG link : CVE-2015-3753


JSON object : View

Products Affected

apple

  • iphone_os
  • safari
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor