René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

104 lines
3.6 KiB
JSON

{
"id": "CVE-2017-17859",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-12-27T17:08:20.390",
"lastModified": "2018-01-16T15:18:02.013",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Samsung Internet Browser 6.2.01.12 allows remote attackers to bypass the Same Origin Policy, and conduct UXSS attacks to obtain sensitive information, via vectors involving an IFRAME element inside XSLT data in one part of an MHTML file. Specifically, JavaScript code in another part of this MHTML file does not have a document.domain value corresponding to the domain that is hosting the MHTML file, but instead has a document.domain value corresponding to an arbitrary URL within the content of the MHTML file."
},
{
"lang": "es",
"value": "Samsung Internet Browser 6.2.01.12 permite que atacantes remotos omitan la pol\u00edtica del mismo origen (SOP) y lleven a cabo ataques UXSS para obtener informaci\u00f3n sensible mediante vectores que incluyen un elemento IFRAME dentro de los datos XSLT en una parte de un archivo MHTML. En concreto, el c\u00f3digo JavaScript en otra parte de este archivo MHTML no tiene un valor document.domain que corresponda con el dominio en el que se aloja el archivo MHTML. Por el contrario, tiene un valor document.domain que corresponde con una URL arbitraria en el contenido del archivo MHTML."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samsung:internet_browser:6.2.01.12:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE5036A-0145-47A8-ABE0-9391744D807B"
}
]
}
]
}
],
"references": [
{
"url": "https://poctestblog.blogspot.com/2017/12/samsung-internet-browser-sop-bypassuxss.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}