An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, Safari 17.1, macOS Sonoma 14.1. Visiting a malicious website may lead to address bar spoofing.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/03/26/1 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/ | Mailing List |
https://support.apple.com/en-us/HT213981 | Vendor Advisory |
https://support.apple.com/en-us/HT213982 | Vendor Advisory |
https://support.apple.com/en-us/HT213984 | Vendor Advisory |
https://support.apple.com/en-us/HT213986 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/03/26/1 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/ | Mailing List |
https://support.apple.com/en-us/HT213981 | Vendor Advisory |
https://support.apple.com/en-us/HT213982 | Vendor Advisory |
https://support.apple.com/en-us/HT213984 | Vendor Advisory |
https://support.apple.com/en-us/HT213986 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
09 Dec 2024, 17:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:* cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:* cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* |
|
First Time |
Apple ipad Os
Webkitgtk Wpewebkit wpe Webkit Apple iphone Os Fedoraproject fedora Apple safari Webkitgtk webkitgtk Fedoraproject Wpewebkit Apple macos Apple |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
References | () http://www.openwall.com/lists/oss-security/2024/03/26/1 - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/ - Mailing List | |
References | () https://support.apple.com/en-us/HT213981 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213982 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213984 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213986 - Vendor Advisory |
21 Nov 2024, 08:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/03/26/1 - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/ - | |
References | () https://support.apple.com/en-us/HT213981 - | |
References | () https://support.apple.com/en-us/HT213982 - | |
References | () https://support.apple.com/en-us/HT213984 - | |
References | () https://support.apple.com/en-us/HT213986 - |
04 Nov 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-290 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
07 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Feb 2024, 19:07
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Feb 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-21 07:15
Updated : 2024-12-09 17:31
NVD link : CVE-2023-42843
Mitre link : CVE-2023-42843
CVE.ORG link : CVE-2023-42843
JSON object : View
Products Affected
apple
- iphone_os
- ipad_os
- safari
- macos
webkitgtk
- webkitgtk
fedoraproject
- fedora
wpewebkit
- wpe_webkit
CWE
CWE-290
Authentication Bypass by Spoofing