First published: Fri Sep 18 2015(Updated: )
WebKit in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain an object reference via vectors involving a (1) custom event, (2) message event, or (3) pop state event.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | <=8.0.8 | |
iStyle @cosme iPhone OS | <=8.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5827 is considered a medium severity vulnerability that allows attackers to bypass the Same Origin Policy.
To mitigate CVE-2015-5827, users should update their iOS or Safari versions to the latest available releases.
CVE-2015-5827 affects Apple iOS versions prior to 9 and Apple Mobile Safari versions up to 8.0.8.
CVE-2015-5827 can be exploited through custom events, message events, or pop state events.
Users of affected Apple devices and Safari browsers prior to the fix are susceptible to the exploits of CVE-2015-5827.