First published: Fri Sep 25 2009(Updated: )
A security flaw was found in the WebKit's Cross-Origin Resource Sharing (CORS) implementation. Quoting exact details from the WebKit advisory: Before allowing a page from one origin to access a resource in another origin, WebKit sends a preflight request, to determine if the origin server for the resource being accessed will allow the resource to be shared. WebKit includes custom HTTP headers specified by the requesting page in the preflight request. This can result in unexpected actions being initiated on the cross-origin site without user consent. This issue is addressed by dropping custom HTTP headers from preflight requests. Upstream bug: ------------- <a href="https://bugs.webkit.org/show_bug.cgi?id=28446">https://bugs.webkit.org/show_bug.cgi?id=28446</a> Upstream patch: --------------- <a href="http://trac.webkit.org/changeset/47494">http://trac.webkit.org/changeset/47494</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <4.0.4 | |
Google Chrome | <3.0.195.33 | |
Apple iPhone OS | <4.0 | |
openSUSE openSUSE | =11.2 | |
openSUSE openSUSE | =11.3 | |
Fedoraproject Fedora | =11 | |
Fedoraproject Fedora | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.