First published: Tue Mar 24 2009(Updated: )
Cross-domain vulnerability in the WorkerPool API in Google Gears before 0.5.4.2 allows remote attackers to bypass the Same Origin Policy and the intended access restrictions of the allowCrossOrigin function by hosting an assumed-safe file type containing Google Gear commands on the target domain, then accessing that file from the attacking domain, whose response headers are not checked and cause the worker code to run in the target domain.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Gears | =0.2 | |
Google Gears | =0.3 | |
Google Gears | <=0.5 | |
Google Gears | =0.4 | |
Google Gears | =0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6512 is considered critical as it allows remote attackers to bypass the Same Origin Policy.
To mitigate CVE-2008-6512, it's recommended to update Google Gears to version 0.5.4.2 or later.
CVE-2008-6512 affects all versions of Google Gears prior to 0.5.4.2.
CVE-2008-6512 is a cross-domain vulnerability affecting the WorkerPool API.
Yes, CVE-2008-6512 can allow attackers to exploit web applications that use Google Gears by bypassing security restrictions.