Vulnerability Description
QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and data: URIs in Refresh and Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains a javascript: URI, (2) entering a javascript: URI when specifying the content of a Refresh header, (3) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header, (5) injecting a Location header that contains JavaScript sequences in a data:text/html URI, or (6) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qtweb | Qtweb | 3.0 |
Related Weaknesses (CWE)
References
- http://websecurity.com.ua/3386/Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52993
- http://websecurity.com.ua/3386/Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52993
FAQ
What is CVE-2009-3015?
CVE-2009-3015 is a vulnerability with a CVSS score of 4.3 (MEDIUM). QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and data: URIs in Refresh and Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) a...
How severe is CVE-2009-3015?
CVE-2009-3015 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-3015?
Check the references section above for vendor advisories and patch information. Affected products include: Qtweb Qtweb.