First published: Wed Dec 18 2013(Updated: )
Apple Safari before 6.1.1 and 7.x before 7.0.1 allows remote attackers to bypass the Same Origin Policy and discover credentials by triggering autofill of subframe form fields.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | <=6.1 | |
Apple Mobile Safari | =6.0 | |
Apple Mobile Safari | =6.0.1 | |
Apple Mobile Safari | =6.0.2 | |
Apple Mobile Safari | =6.0.3 | |
Apple Mobile Safari | =6.0.4 | |
Apple Mobile Safari | =6.0.5 | |
Apple Mobile Safari | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5227 is considered a moderate severity vulnerability due to its potential to expose user credentials.
To fix CVE-2013-5227, update your Apple Safari browser to version 6.1.1 or later for Safari 6.x, or to version 7.0.1 or later for Safari 7.x.
CVE-2013-5227 exploits the Same Origin Policy in Apple Safari, allowing attackers to access user data through autofill in subframe form fields.
CVE-2013-5227 affects Apple Safari versions prior to 6.1.1 and 7.x before 7.0.1.
Yes, CVE-2013-5227 can be exploited remotely by attackers to discover credentials.