The page-loading implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, does not properly handle the rel attribute in an A element, which allows remote attackers to bypass the Same Origin Policy for a links target, and spoof the user interface, via a crafted web site.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Iphone_os | Apple | * | 8.3 (including) |
Qtwebkit-opensource-src | Ubuntu | devel | * |
Qtwebkit-opensource-src | Ubuntu | esm-infra/xenial | * |
Qtwebkit-opensource-src | Ubuntu | trusty | * |
Qtwebkit-opensource-src | Ubuntu | utopic | * |
Qtwebkit-opensource-src | Ubuntu | vivid | * |
Qtwebkit-opensource-src | Ubuntu | wily | * |
Qtwebkit-opensource-src | Ubuntu | xenial | * |
Qtwebkit-opensource-src | Ubuntu | yakkety | * |
Qtwebkit-source | Ubuntu | devel | * |
Qtwebkit-source | Ubuntu | esm-apps/xenial | * |
Qtwebkit-source | Ubuntu | precise | * |
Qtwebkit-source | Ubuntu | trusty | * |
Qtwebkit-source | Ubuntu | utopic | * |
Qtwebkit-source | Ubuntu | vivid | * |
Qtwebkit-source | Ubuntu | wily | * |
Qtwebkit-source | Ubuntu | xenial | * |
Qtwebkit-source | Ubuntu | yakkety | * |
Webkit | Ubuntu | precise | * |
Webkitgtk | Ubuntu | devel | * |
Webkitgtk | Ubuntu | esm-apps/xenial | * |
Webkitgtk | Ubuntu | trusty | * |
Webkitgtk | Ubuntu | utopic | * |
Webkitgtk | Ubuntu | vivid | * |
Webkitgtk | Ubuntu | wily | * |
Webkitgtk | Ubuntu | xenial | * |
Webkitgtk | Ubuntu | yakkety | * |