René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

118 lines
4.0 KiB
JSON

{
"id": "CVE-2008-6512",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-03-24T14:30:00.187",
"lastModified": "2017-08-17T01:29:21.177",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-domain vulnerability in the WorkerPool API in Google Gears before 0.5.4.2 allows remote attackers to bypass the Same Origin Policy and the intended access restrictions of the allowCrossOrigin function by hosting an assumed-safe file type containing Google Gear commands on the target domain, then accessing that file from the attacking domain, whose response headers are not checked and cause the worker code to run in the target domain."
},
{
"lang": "es",
"value": "Vulnerabilidad de dominio cruzado en la API WorkerPool en Google Gears anteriores a v0.5.4.2 lo que permite a atacantes remotos evitar la pol\u00edtica de igual origen y las restricciones de acceso previstas de la funci\u00f3n allowCrossOrigin , asumiendo la existencia de un fichero seguro que contiene los comandos de Google Gear en el dominio objetivo, cuando se accede a ese fichero desde el dominio atacante, las cabeceras de respuesta no son chequeadas y el c\u00f3digo worker corre en el dominio objetivo."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:gears:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5",
"matchCriteriaId": "271F3D6D-7889-4E46-8C18-96E7DE62FDBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:gears:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE9BA757-2DE8-4FCD-BFA6-34E6A75CB6EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:gears:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "35698CCD-C9A1-4351-9E1D-5C70317600D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:gears:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3213B623-4184-4F0D-A857-7FC53C362600"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:gears:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "74B98C2A-B8BE-4F2B-8C61-8408388586FC"
}
]
}
]
}
],
"references": [
{
"url": "http://blog.watchfire.com/wfblog/2008/12/breaking-google-gears-cross-origin-communication-model.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://code.google.com/apis/gears/upcoming/api_workerpool.html#cross_origin",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/32698",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47173",
"source": "cve@mitre.org"
}
]
}