First published: Mon Jul 24 2023(Updated: )
A website may be able to bypass Same Origin Policy. Description: The issue was addressed with improved checks. <a href="https://webkitgtk.org/security/WSA-2023-0007.html">https://webkitgtk.org/security/WSA-2023-0007.html</a>
Credit: product-security@apple.com product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <15.7.8 | |
Apple iPhone OS | <15.7.8 | |
Apple macOS | >=13.0<13.5 | |
Apple watchOS | <9.6 | |
Apple tvOS | <16.6 | |
Apple iPadOS | >=16.0<16.6 | |
Apple iPhone OS | >=16.0<16.6 | |
Apple Safari | <16.6 | |
ubuntu/webkit2gtk | <2.40.5 | 2.40.5 |
ubuntu/webkit2gtk | <2.40.5-0ubuntu0.22.04.1 | 2.40.5-0ubuntu0.22.04.1 |
ubuntu/webkit2gtk | <2.40.5-0ubuntu0.23.04.1 | 2.40.5-0ubuntu0.23.04.1 |
ubuntu/webkit2gtk | <2.40.5-1 | 2.40.5-1 |
Apple tvOS | <16.6 | 16.6 |
Apple watchOS | <9.6 | 9.6 |
Apple macOS Ventura | <13.5 | 13.5 |
Apple Safari | <16.6 | 16.6 |
debian/webkit2gtk | <=2.36.4-1~deb10u1<=2.38.6-0+deb10u1 | 2.42.2-1~deb11u1 2.42.5-1~deb11u1 2.42.2-1~deb12u1 2.42.5-1~deb12u1 2.42.5-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.42.5-1 2.42.5-1.1 |
Apple iOS | <16.6 | 16.6 |
Apple iPadOS | <16.6 | 16.6 |
Apple iOS | <15.7.8 | 15.7.8 |
Apple iPadOS | <15.7.8 | 15.7.8 |
redhat/webkitgtk | <2.40.5 | 2.40.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-38572.
The severity of CVE-2023-38572 is high with a CVSS score of 7.5.
CVE-2023-38572 affects Apple devices running iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, and watchOS 9.6.
CVE-2023-38572 allows a website to bypass Same Origin Policy, potentially leading to unauthorized access or data leakage.
To fix CVE-2023-38572, update to the fixed versions of the affected software as mentioned in the vendor advisories.