Lucene search

K
cve[email protected]CVE-2012-5851
HistoryNov 15, 2012 - 11:58 a.m.

CVE-2012-5851

2012-11-1511:58:40
CWE-79
web.nvd.nist.gov
31
cve-2012-5851
webcore
xssauditor
webkit
google chrome
safari 5.1.7
xss
remote attackers
bypass
nvd

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.7%

html/parser/XSSAuditor.cpp in WebCore in WebKit, as used in Google Chrome through 22 and Safari 5.1.7, does not consider all possible output contexts of reflected data, which makes it easier for remote attackers to bypass a cross-site scripting (XSS) protection mechanism via a crafted string, aka rdar problem 12019108.

Affected configurations

NVD
Node
applewebkit
OR
googlechromeRange≀22.0.1229.96
OR
googlechromeMatch22.0.1229.0
OR
googlechromeMatch22.0.1229.1
OR
googlechromeMatch22.0.1229.2
OR
googlechromeMatch22.0.1229.3
OR
googlechromeMatch22.0.1229.4
OR
googlechromeMatch22.0.1229.6
OR
googlechromeMatch22.0.1229.7
OR
googlechromeMatch22.0.1229.8
OR
googlechromeMatch22.0.1229.9
OR
googlechromeMatch22.0.1229.10
OR
googlechromeMatch22.0.1229.11
OR
googlechromeMatch22.0.1229.12
OR
googlechromeMatch22.0.1229.14
OR
googlechromeMatch22.0.1229.16
OR
googlechromeMatch22.0.1229.17
OR
googlechromeMatch22.0.1229.18
OR
googlechromeMatch22.0.1229.20
OR
googlechromeMatch22.0.1229.21
OR
googlechromeMatch22.0.1229.22
OR
googlechromeMatch22.0.1229.23
OR
googlechromeMatch22.0.1229.24
OR
googlechromeMatch22.0.1229.25
OR
googlechromeMatch22.0.1229.26
OR
googlechromeMatch22.0.1229.27
OR
googlechromeMatch22.0.1229.28
OR
googlechromeMatch22.0.1229.29
OR
googlechromeMatch22.0.1229.31
OR
googlechromeMatch22.0.1229.32
OR
googlechromeMatch22.0.1229.33
OR
googlechromeMatch22.0.1229.35
OR
googlechromeMatch22.0.1229.36
OR
googlechromeMatch22.0.1229.37
OR
googlechromeMatch22.0.1229.39
OR
googlechromeMatch22.0.1229.48
OR
googlechromeMatch22.0.1229.49
OR
googlechromeMatch22.0.1229.50
OR
googlechromeMatch22.0.1229.51
OR
googlechromeMatch22.0.1229.52
OR
googlechromeMatch22.0.1229.53
OR
googlechromeMatch22.0.1229.54
OR
googlechromeMatch22.0.1229.55
OR
googlechromeMatch22.0.1229.56
OR
googlechromeMatch22.0.1229.57
OR
googlechromeMatch22.0.1229.58
OR
googlechromeMatch22.0.1229.59
OR
googlechromeMatch22.0.1229.60
OR
googlechromeMatch22.0.1229.62
OR
googlechromeMatch22.0.1229.63
OR
googlechromeMatch22.0.1229.64
OR
googlechromeMatch22.0.1229.65
OR
googlechromeMatch22.0.1229.67
OR
googlechromeMatch22.0.1229.76
OR
googlechromeMatch22.0.1229.78
OR
googlechromeMatch22.0.1229.79
OR
googlechromeMatch22.0.1229.89
OR
googlechromeMatch22.0.1229.91
OR
googlechromeMatch22.0.1229.92
OR
googlechromeMatch22.0.1229.94
OR
googlechromeMatch22.0.1229.95
Node
applesafariMatch5.1.7
OR
applewebkit

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.7%