Vulnerability Description
xml/XMLHttpRequest.cpp in WebCore in WebKit before r38566 does not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webkit | Webkit | All versions |
Related Weaknesses (CWE)
References
- http://trac.webkit.org/changeset/38566/trunk/WebCore/xml/XMLHttpRequest.cpp
- http://www.securityfocus.com/bid/33804
- https://bugs.webkit.org/show_bug.cgi?id=10957
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48575
- http://trac.webkit.org/changeset/38566/trunk/WebCore/xml/XMLHttpRequest.cpp
- http://www.securityfocus.com/bid/33804
- https://bugs.webkit.org/show_bug.cgi?id=10957
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48575
FAQ
What is CVE-2008-6059?
CVE-2008-6059 is a vulnerability with a CVSS score of 5.0 (MEDIUM). xml/XMLHttpRequest.cpp in WebCore in WebKit before r38566 does not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attacker...
How severe is CVE-2008-6059?
CVE-2008-6059 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-6059?
Check the references section above for vendor advisories and patch information. Affected products include: Webkit Webkit.