{ "id": "CVE-2008-5914", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-20T16:30:00.390", "lastModified": "2009-01-23T15:44:02.883", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An unspecified function in the JavaScript implementation in Apple Safari creates and exposes a \"temporary footprint\" when there is a current login to a web site, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an \"in-session phishing attack.\" NOTE: as of 20090116, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes." }, { "lang": "es", "value": "Una funci\u00f3n desconocida en la implementaci\u00f3n JavaScript en Apple Safari crea y expone una \"huella temporal\" cuando hay un inicio de sesi\u00f3n actualmente a un sitio web, lo que facilita a atacantes remotos enga\u00f1ar a un usuario para que haga lo que le dice un mensaje pop-up envenenado, tambi\u00e9n conocido como un \" ataque de phishing en una sesi\u00f3n activa.\" NOTA: a fecha de 16012009, lo \u00fanico que ha salido a la luz es un pre-aviso impreciso con informaci\u00f3n no utilizable. sin embargo, ya que el investigador es conocido, se le ha asignado un identificador CVE con prop\u00f3sitos de seguimiento." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 2.1 }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE370CAA-04B3-434E-BD5B-1D87DE596C10" } ] } ] } ], "references": [ { "url": "http://arstechnica.com/news.ars/post/20090113-new-method-of-phishmongering-could-fool-experienced-users.html", "source": "cve@mitre.org" }, { "url": "http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161", "source": "cve@mitre.org" }, { "url": "http://www.infoworld.com/article/09/01/13/Browser_bug_could_allow_phishing_without_email_1.html", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/33276", "source": "cve@mitre.org" }, { "url": "http://www.trusteer.com/files/In-session-phishing-advisory-2.pdf", "source": "cve@mitre.org" } ] }