First published: Sun Aug 16 2015(Updated: )
The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote attackers to obtain sensitive information via vectors involving (1) a cross-origin request or (2) a private-browsing request.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | >=6.0<6.2.8 | |
Apple Mobile Safari | >=7.0<7.1.8 | |
Apple Mobile Safari | >=8.0<8.0.8 | |
iStyle @cosme iPhone OS | <8.4.1 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3752 is classified as a medium severity vulnerability due to its potential to expose sensitive cookie information to remote attackers.
To mitigate CVE-2015-3752, users should update their Apple Safari browser and associated operating systems to the latest versions that contain the security patches.
CVE-2015-3752 affects Apple Safari versions prior to 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8.
Yes, CVE-2015-3752 affects iOS versions prior to 8.4.1, allowing the potential leakage of sensitive user data.
CVE-2015-3752 primarily impacts Apple Safari and can affect devices running certain versions of Ubuntu and iOS.