WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly perform taint checking for CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive image data by leveraging a redirect to a data:image resource.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/76341 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1033274 | Third Party Advisory VDB Entry |
https://support.apple.com/kb/HT205030 | Vendor Advisory |
https://support.apple.com/kb/HT205033 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2015-08-16 23:59
Updated : 2024-02-04 18:53
NVD link : CVE-2015-3753
Mitre link : CVE-2015-3753
CVE.ORG link : CVE-2015-3753
JSON object : View
Products Affected
apple
- iphone_os
- safari
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor