{ "id": "CVE-2009-2816", "sourceIdentifier": "cve@mitre.org", "published": "2009-11-13T15:30:00.563", "lastModified": "2021-11-08T21:43:27.700", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The implementation of Cross-Origin Resource Sharing (CORS) in WebKit, as used in Apple Safari before 4.0.4 and Google Chrome before 3.0.195.33, includes certain custom HTTP headers in the OPTIONS request during cross-origin operations with preflight, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web page." }, { "lang": "es", "value": "La implementaci\u00f3n de Cross-Origin Resource Sharing (CORS) en WebKit, tal como es usado en Safari de Apple anterior a versi\u00f3n 4.0.4 y Chrome de Google anterior a versi\u00f3n 3.0.195.33, incluye ciertos encabezados HTTP personalizados en la petici\u00f3n OPTIONS durante operaciones entre or\u00edgenes con comprobaci\u00f3n previa, lo que facilita a los atacantes remotos conducir ataques de tipo cross-site request forgery (CSRF) por medio de una p\u00e1gina web especialmente dise\u00f1ada." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-352" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.0.4", "matchCriteriaId": "77BC4840-8A34-40F9-873B-DF0F4CADCBDD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.0.195.33", "matchCriteriaId": "56C129DC-11E1-4710-B0F1-E0AF5AF6F6F7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.0", "matchCriteriaId": "73DE6E60-6BDD-450C-B7E2-744A0183A2DD" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95" }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "5646FDE9-CF21-46A9-B89D-F5BBDB4249AF" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "matchCriteriaId": "E44669D7-6C1E-4844-B78A-73E253A7CC17" } ] } ] } ], "references": [ { "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html", "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ] }, { "url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html", "source": "cve@mitre.org", "tags": [ "Mailing List", "Vendor Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://osvdb.org/59940", "source": "cve@mitre.org", "tags": [ "Broken Link" ] }, { "url": "http://osvdb.org/59967", "source": "cve@mitre.org", "tags": [ "Broken Link" ] }, { "url": "http://secunia.com/advisories/37346", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/37358", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/37393", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/37397", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/43068", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://support.apple.com/kb/HT3949", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://support.apple.com/kb/HT4225", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/36997", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id?1023165", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.vupen.com/english/advisories/2009/3217", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2009/3233", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2011/0212", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=525789", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54239", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6516", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00545.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00549.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] } ] }