First published: Fri Oct 09 2015(Updated: )
The API in the WebKit Plug-ins component in Apple Safari before 9 does not provide notification of an HTTP Redirection (aka 3xx) status code to a plugin, which allows remote attackers to bypass intended request restrictions via a crafted web site.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =42.1 | |
Apple Mobile Safari | <=8.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5828 is classified as a medium severity vulnerability.
To fix CVE-2015-5828, update Apple Safari to version 9 or later.
CVE-2015-5828 affects all versions of Apple Safari prior to 9.0.
Yes, CVE-2015-5828 can be exploited remotely through a crafted web site.
The impact of CVE-2015-5828 allows attackers to bypass intended request restrictions on affected systems.