QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and data: URIs in Refresh and Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains a javascript: URI, (2) entering a javascript: URI when specifying the content of a Refresh header, (3) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header, (5) injecting a Location header that contains JavaScript sequences in a data:text/html URI, or (6) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header.
References
Configurations
History
21 Nov 2024, 01:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://websecurity.com.ua/3386/ - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/52993 - |
Information
Published : 2009-08-31 16:30
Updated : 2024-11-21 01:06
NVD link : CVE-2009-3015
Mitre link : CVE-2009-3015
CVE.ORG link : CVE-2009-3015
JSON object : View
Products Affected
qtweb
- qtweb
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')