First published: Mon Aug 31 2009(Updated: )
Apple Safari 4.0.3 does not properly block javascript: and data: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains a javascript: URI, (2) entering a javascript: URI when specifying the content of a Refresh header, (3) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, or (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | =4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3016 has a moderate severity rating due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2009-3016, update Apple Safari to a version that has addressed this vulnerability.
CVE-2009-3016 is associated with cross-site scripting (XSS) attacks enabled by improper handling of Refresh headers.
CVE-2009-3016 specifically affects Apple Safari version 4.0.3.
Yes, CVE-2009-3016 can be exploited remotely by injecting malicious Refresh headers containing javascript: URIs.