Vulnerability Details : CVE-2015-5828
The API in the WebKit Plug-ins component in Apple Safari before 9 does not provide notification of an HTTP Redirection (aka 3xx) status code to a plugin, which allows remote attackers to bypass intended request restrictions via a crafted web site.
Products affected by CVE-2015-5828
- cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-5828
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-5828
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2015-5828
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-5828
-
http://www.securityfocus.com/bid/79707
Apple Safari WebKit Plug-ins CVE-2015-5828 Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00007.html
Apple - Lists.apple.comVendor Advisory
-
https://support.apple.com/HT205265
About the security content of Safari 9 - Apple SupportVendor Advisory
-
http://www.securitytracker.com/id/1033688
Apple Safari Extensions and Plug-ins Flaws Let Remote Users Replace Extensions and Redirect Plugin Requests - SecurityTrackerThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html
openSUSE-SU-2016:0761-1: moderate: Security update for webkit2gtk3Third Party Advisory
Jump to