CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
89.5%
Cross-domain vulnerability in the WorkerPool API in Google Gears before 0.5.4.2 allows remote attackers to bypass the Same Origin Policy and the intended access restrictions of the allowCrossOrigin function by hosting an assumed-safe file type containing Google Gear commands on the target domain, then accessing that file from the attacking domain, whose response headers are not checked and cause the worker code to run in the target domain.
blog.watchfire.com/wfblog/2008/12/breaking-google-gears-cross-origin-communication-model.html
code.google.com/apis/gears/upcoming/api_workerpool.html#cross_origin
lists.grok.org.uk/pipermail/full-disclosure/2008-December/066291.html
secunia.com/advisories/33062
www.securityfocus.com/bid/32698
exchange.xforce.ibmcloud.com/vulnerabilities/47173