Description: | Summary: This host is installed with Apple Safari and is prone to multiple vulnerabilities.
Vulnerability Insight: Multiple flaws exist duu to,
- Multiple memory corruption issues existed in WebKit.
- An error existed in Content Security Policy report requests which would not honor HTTP Strict Transport Security.
- An issue existed where websites with video controls would load images nested in object elements in violation of the website's Content Security Policy directive.
- Two issues existed in how cookies were added to Content Security Policy report requests. Cookies were sent in cross-origin report requests in violation of the standard.
- Images fetched through URLs that redirected to a data:image resource could have been exfiltrated cross-origin.
- An issue existed in caching of HTTP authentication. Credentials entered in private browsing mode were carried over to regular browsing which would reveal parts of the user's private browsing history.
- Navigating to a malformed URL may have allowed a malicious website to display an arbitrary URL.
- A malicious website could open another site and prompt for user input without a way for the user to tell where the prompt came from.
Vulnerability Impact: Successful exploitation will allow remote attackers to conduct spoofing attack, unexpected application termination or arbitrary code execution, trigger plaintext requests to an origin under HTTP Strict Transport Security, load image out of accordance with Content Security Policy directive, gain access to sensitive information, exfiltrate image data cross-origin and reveal private browsing history.
Affected Software/OS: Apple Safari versions before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8
Solution: Upgrade to Apple Safari version 6.2.8 or 7.1.8 or 8.0.8 or later.
CVSS Score: 6.8
CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
|