First published: Fri Sep 25 2009(Updated: )
A security flaw was found in the WebKit's Cross-Origin Resource Sharing (CORS) implementation. Quoting exact details from the WebKit advisory: Before allowing a page from one origin to access a resource in another origin, WebKit sends a preflight request, to determine if the origin server for the resource being accessed will allow the resource to be shared. WebKit includes custom HTTP headers specified by the requesting page in the preflight request. This can result in unexpected actions being initiated on the cross-origin site without user consent. This issue is addressed by dropping custom HTTP headers from preflight requests. Upstream bug: ------------- <a href="https://bugs.webkit.org/show_bug.cgi?id=28446">https://bugs.webkit.org/show_bug.cgi?id=28446</a> Upstream patch: --------------- <a href="http://trac.webkit.org/changeset/47494">http://trac.webkit.org/changeset/47494</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <4.0 | |
Apple Mobile Safari | <4.0.4 | |
Google Chrome (Trace Event) | <3.0.195.33 | |
SUSE Linux | =11.2 | |
SUSE Linux | =11.3 | |
Fedora | =11 | |
Fedora | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2816 is classified as a moderate severity vulnerability due to its potential impact on cross-origin resource sharing.
To mitigate CVE-2009-2816, update your browser or operating system to the latest version provided by the vendor.
CVE-2009-2816 affects older versions of Apple Safari, Google Chrome, Apple iPhone OS, and specific releases of openSUSE and Fedora.
CVE-2009-2816 primarily impacts web applications that utilize cross-origin resource sharing (CORS) features.
Yes, CVE-2009-2816 can potentially expose sensitive data by allowing unauthorized access to resources from different origins.