CVE-2023-38572

The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. A website may be able to bypass Same Origin Policy.
References
Link Resource
http://www.openwall.com/lists/oss-security/2023/08/02/1 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
https://security.gentoo.org/glsa/202401-04
https://support.apple.com/en-us/HT213841 Vendor Advisory
https://support.apple.com/en-us/HT213842 Vendor Advisory
https://support.apple.com/en-us/HT213843 Vendor Advisory
https://support.apple.com/en-us/HT213846 Vendor Advisory
https://support.apple.com/en-us/HT213847 Vendor Advisory
https://support.apple.com/en-us/HT213848 Vendor Advisory
https://www.debian.org/security/2023/dsa-5468
http://www.openwall.com/lists/oss-security/2023/08/02/1 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
https://security.gentoo.org/glsa/202401-04
https://support.apple.com/en-us/HT213841 Vendor Advisory
https://support.apple.com/en-us/HT213842 Vendor Advisory
https://support.apple.com/en-us/HT213843 Vendor Advisory
https://support.apple.com/en-us/HT213846 Vendor Advisory
https://support.apple.com/en-us/HT213847 Vendor Advisory
https://support.apple.com/en-us/HT213848 Vendor Advisory
https://www.debian.org/security/2023/dsa-5468
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:13

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/08/02/1 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2023/08/02/1 - Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/ -
References () https://security.gentoo.org/glsa/202401-04 - () https://security.gentoo.org/glsa/202401-04 -
References () https://support.apple.com/en-us/HT213841 - Vendor Advisory () https://support.apple.com/en-us/HT213841 - Vendor Advisory
References () https://support.apple.com/en-us/HT213842 - Vendor Advisory () https://support.apple.com/en-us/HT213842 - Vendor Advisory
References () https://support.apple.com/en-us/HT213843 - Vendor Advisory () https://support.apple.com/en-us/HT213843 - Vendor Advisory
References () https://support.apple.com/en-us/HT213846 - Vendor Advisory () https://support.apple.com/en-us/HT213846 - Vendor Advisory
References () https://support.apple.com/en-us/HT213847 - Vendor Advisory () https://support.apple.com/en-us/HT213847 - Vendor Advisory
References () https://support.apple.com/en-us/HT213848 - Vendor Advisory () https://support.apple.com/en-us/HT213848 - Vendor Advisory
References () https://www.debian.org/security/2023/dsa-5468 - () https://www.debian.org/security/2023/dsa-5468 -

05 Jan 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-04 -

18 Aug 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/ -

07 Aug 2023, 08:15

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/ -
  • (MISC) https://www.debian.org/security/2023/dsa-5468 -
References (MISC) https://support.apple.com/en-us/HT213841 - (MISC) https://support.apple.com/en-us/HT213841 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213848 - (MISC) https://support.apple.com/en-us/HT213848 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213842 - (MISC) https://support.apple.com/en-us/HT213842 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213843 - (MISC) https://support.apple.com/en-us/HT213843 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213846 - (MISC) https://support.apple.com/en-us/HT213846 - Vendor Advisory
References (MISC) http://www.openwall.com/lists/oss-security/2023/08/02/1 - (MISC) http://www.openwall.com/lists/oss-security/2023/08/02/1 - Third Party Advisory
References (MISC) https://support.apple.com/en-us/HT213847 - (MISC) https://support.apple.com/en-us/HT213847 - Vendor Advisory

02 Aug 2023, 12:15

Type Values Removed Values Added
References
  • (MISC) http://www.openwall.com/lists/oss-security/2023/08/02/1 -

27 Jul 2023, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-27 01:15

Updated : 2024-11-21 08:13


NVD link : CVE-2023-38572

Mitre link : CVE-2023-38572

CVE.ORG link : CVE-2023-38572


JSON object : View

Products Affected

apple

  • iphone_os
  • safari
  • watchos
  • tvos
  • macos
  • ipados