var-200505-1089
Vulnerability from variot
AppleWebKit (WebCore and WebKit), as used in multiple products such as Safari 1.2 and OmniGroup OmniWeb 5.1, allows remote attackers to read arbitrary files via the XMLHttpRequest Javascript component, as demonstrated using automatically mounted disk images and file:// URLs. Web browsers based on AppleWebKit may allow remote web sites to reference content on the local filesystem. This may allow an attacker to execute script within the security context of the local machine. A remote code execution vulnerability affects Apple's WebCore Framework. This issue is due to a failure of the affected framework library to securely handle remote scripts. An attacker may leverage this issue to execute arbitrary code with the privileges of a user that activated the malicious remote script, facilitating unauthorized access and privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200505-1089", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "omniweb", "scope": "eq", "trust": 1.6, "vendor": "omnigroup", "version": "5.1" }, { "model": "safari", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "1.2" }, { "model": "shiira", "scope": "eq", "trust": 1.0, "vendor": "hmdt", "version": "0.93" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "omnigroup", "version": null }, { "model": "group omniweb", "scope": "eq", "trust": 0.3, "vendor": "omni", "version": "5.1" }, { "model": "safari rss pre-release", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0" }, { "model": "safari", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "1.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#998369" }, { "db": "BID", "id": "13202" }, { "db": "CNNVD", "id": "CNNVD-200505-620" }, { "db": "NVD", "id": "CVE-2005-0976" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "David Remahl", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-620" } ], "trust": 0.6 }, "cve": "CVE-2005-0976", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2005-0976", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-12185", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2005-0976", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#998369", "trust": 0.8, "value": "4.78" }, { "author": "CNNVD", "id": "CNNVD-200505-620", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-12185", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#998369" }, { "db": "VULHUB", "id": "VHN-12185" }, { "db": "CNNVD", "id": "CNNVD-200505-620" }, { "db": "NVD", "id": "CVE-2005-0976" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "AppleWebKit (WebCore and WebKit), as used in multiple products such as Safari 1.2 and OmniGroup OmniWeb 5.1, allows remote attackers to read arbitrary files via the XMLHttpRequest Javascript component, as demonstrated using automatically mounted disk images and file:// URLs. Web browsers based on AppleWebKit may allow remote web sites to reference content on the local filesystem. This may allow an attacker to execute script within the security context of the local machine. A remote code execution vulnerability affects Apple\u0027s WebCore Framework. This issue is due to a failure of the affected framework library to securely handle remote scripts. \nAn attacker may leverage this issue to execute arbitrary code with the privileges of a user that activated the malicious remote script, facilitating unauthorized access and privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2005-0976" }, { "db": "CERT/CC", "id": "VU#998369" }, { "db": "BID", "id": "13202" }, { "db": "VULHUB", "id": "VHN-12185" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2005-0976", "trust": 2.0 }, { "db": "BID", "id": "13202", "trust": 1.2 }, { "db": "XF", "id": "20124", "trust": 0.8 }, { "db": "OSVDB", "id": "15637", "trust": 0.8 }, { "db": "SECUNIA", "id": "14974", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#998369", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200505-620", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2005-04-15", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-12185", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#998369" }, { "db": "VULHUB", "id": "VHN-12185" }, { "db": "BID", "id": "13202" }, { "db": "CNNVD", "id": "CNNVD-200505-620" }, { "db": "NVD", "id": "CVE-2005-0976" } ] }, "id": "VAR-200505-1089", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-12185" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:50:01.858000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0976" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://remahl.se/david/vuln/001/" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2005/apr/msg00000.html" }, { "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=301327" }, { "trust": 0.8, "url": "http://www.osvdb.org/15637" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/20124" }, { "trust": 0.8, "url": "http://secunia.com/advisories/14974" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/13202" }, { "trust": 0.8, "url": "http://packetstormsecurity.org/0504-advisories/apple_webkit_filedisclosure.txt" }, { "trust": 0.8, "url": "http://www.omnigroup.com/applications/omniweb/releasenotes/" }, { "trust": 0.3, "url": "http://developer.apple.com/darwin/projects/webcore/" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" }, { "trust": 0.3, "url": "http://www.omnigroup.com/applications/omniweb/" }, { "trust": 0.3, "url": "http://www.apple.com/safari/" }, { "trust": 0.3, "url": "http://hmdt-web.net/shiira/index-e.html" }, { "trust": 0.3, "url": "/archive/1/396046" }, { "trust": 0.1, "url": "" } ], "sources": [ { "db": "CERT/CC", "id": "VU#998369" }, { "db": "VULHUB", "id": "VHN-12185" }, { "db": "BID", "id": "13202" }, { "db": "CNNVD", "id": "CNNVD-200505-620" }, { "db": "NVD", "id": "CVE-2005-0976" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#998369" }, { "db": "VULHUB", "id": "VHN-12185" }, { "db": "BID", "id": "13202" }, { "db": "CNNVD", "id": "CNNVD-200505-620" }, { "db": "NVD", "id": "CVE-2005-0976" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-07-06T00:00:00", "db": "CERT/CC", "id": "VU#998369" }, { "date": "2005-05-02T00:00:00", "db": "VULHUB", "id": "VHN-12185" }, { "date": "2005-04-16T00:00:00", "db": "BID", "id": "13202" }, { "date": "2005-05-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-620" }, { "date": "2005-05-02T04:00:00", "db": "NVD", "id": "CVE-2005-0976" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-07-06T00:00:00", "db": "CERT/CC", "id": "VU#998369" }, { "date": "2008-09-05T00:00:00", "db": "VULHUB", "id": "VHN-12185" }, { "date": "2009-07-12T12:56:00", "db": "BID", "id": "13202" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-620" }, { "date": "2024-11-20T23:56:18.870000", "db": "NVD", "id": "CVE-2005-0976" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-620" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple WebCore Framework XMLHttpRequests Remote Code Execution Vulnerability", "sources": [ { "db": "BID", "id": "13202" }, { "db": "CNNVD", "id": "CNNVD-200505-620" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access verification error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-620" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.