Vulnerability Description
WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, does not properly interpret Unicode encoding, which allows remote attackers to spoof a postMessage origin, and bypass intended restrictions on sending a message to a connected frame or window, via crafted characters in a URL.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Safari | <= 6.1.3 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html
- http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html
- http://support.apple.com/kb/HT6254Vendor Advisory
- http://www.securityfocus.com/bid/67554
- http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html
- http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html
- http://support.apple.com/kb/HT6254Vendor Advisory
- http://www.securityfocus.com/bid/67554
FAQ
What is CVE-2014-1346?
CVE-2014-1346 is a vulnerability with a CVSS score of 5.0 (MEDIUM). WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, does not properly interpret Unicode encoding, which allows remote attackers to spoof a postMessage origin, and bypass intended restri...
How severe is CVE-2014-1346?
CVE-2014-1346 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1346?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Safari.