First published: Mon Oct 28 2019(Updated: )
A logic issue was addressed with improved state management. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to universal cross site scripting.
Credit: an anonymous researcher an anonymous researcher an anonymous researcher an anonymous researcher product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <12.10.2 | 12.10.2 |
Apple Safari | <13.0.3 | 13.0.3 |
Apple tvOS | <13.2 | 13.2 |
redhat/webkitgtk | <2.26.1 | 2.26.1 |
Apple iOS | <13.2 | 13.2 |
Apple iPadOS | <13.2 | 13.2 |
Apple Icloud Windows | <10.8 | |
Apple Itunes Windows | <12.10.2 | |
Apple Safari | <13.0.3 | |
Apple iPadOS | <13.2 | |
Apple iPhone OS | <13.2 | |
Apple tvOS | <13.2 | |
Webkitgtk Webkitgtk\+ | <2.26.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2019-8813.
The severity rating of CVE-2019-8813 is medium.
iOS versions up to 13.2, iPadOS versions up to 13.2, tvOS versions up to 13.2, Safari versions up to 13.0.3, iTunes for Windows versions up to 12.10.2, and iCloud for Windows versions up to 10.8 are affected by CVE-2019-8813.
To fix CVE-2019-8813, update to iOS 13.2 or later, iPadOS 13.2 or later, tvOS 13.2 or later, Safari 13.0.3 or later, iTunes for Windows 12.10.2 or later, or iCloud for Windows 11.0 or later.
The CWE ID for CVE-2019-8813 is 79.