WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly perform taint checking for CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive image data by leveraging a redirect to a data:image resource.
References
Link | Resource |
---|---|
https://support.apple.com/kb/HT205033 | Vendor Advisory |
https://support.apple.com/kb/HT205030 | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Aug/msg00000.html | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/76341 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1033274 | Third Party Advisory VDB Entry |
Information
Published : 2015-08-16 16:59
Updated : 2019-02-07 11:51
NVD link : CVE-2015-3753
Mitre link : CVE-2015-3753
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
apple
- safari
- iphone_os