It was discovered that the IcedTea-Web used codebase attribute of the <applet> tag on the HTML page that hosts Java applet in the Same Origin Policy (SOP) checks. As the specified codebase does not have to match the applet's actual origin, this allowed malicious site to bypass SOP via spoofed codebase value.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1256403 | Exploit Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1256403 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 02:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1256403 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2022-07-07 16:15
Updated : 2024-11-21 02:32
NVD link : CVE-2015-5236
Mitre link : CVE-2015-5236
CVE.ORG link : CVE-2015-5236
JSON object : View
Products Affected
icedtea-web_project
- icedtea-web
CWE
CWE-345
Insufficient Verification of Data Authenticity