{"vuid":"VU#845708","idnumber":"845708","name":"Apple WebCore XMLHttpRequest fails to properly serialize headers into an HTTP request","keywords":["Apple","WebCore","XMLHttpRequest","cross-site scripting","xss","serialize headers","HTTP request","apple_2007-006","Safari"],"overview":"Apple WebCore fails to properly serialize headers into an HTTP request, which can cause a cross-domain security violation.","clean_desc":"Apple WebCore is one of the components of the WebKit web browser engine that is used by Safari, Dashboard, Mail, and other applications. WebCore provides support for the XMLHttpRequest object, which allows dynamic HTML and XML functionality. XMLHttpRequest in WebCore fails to properly serialize headers when creating an HTTP request, which can lead to a cross-domain violation.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker may be able to execute script or obtain full access to content in a different domain. The impact is similar to that of a cross-site scripting vulnerability. This includes the ability to spoof or modify web content, access website information such as cookies, or retrieve data from an encrypted HTTPS connection. For a more detailed description of the impact of cross-site scripting vulnerabilities, please see CERT Advisory CA-2000-02.","resolution":"Apply an update\nThis issue is addressed by Apple Security Update 2007-006 .","workarounds":"Disable JavaScript This vulnerability can be mitigated in Safari by disabling JavaScript. Guidelines for setting preferences in Safari can be found in the \"Securing Your Web Browser\" document. Note that other applications that use Apple WebCore may still be at risk after making this change.","sysaffected":"","thanks":"This vulnerability was reported by Apple, who in turn credit Richard Moore of Westpoint Ltd.","author":"This document was written by Will Dormann.","public":["http://www.cert.org/tech_tips/securing_browser/#Safari","http://developer.apple.com/opensource/internet/webkit.html","http://developer.apple.com/internet/webcontent/xmlhttpreq.html","http://docs.info.apple.com/article.html?artnum=305759","http://www.westpoint.ltd.uk/advisories/wp-07-0002.txt","http://secunia.com/advisories/25786/","http://secunia.com/advisories/26287/"],"cveids":["CVE-2007-2401"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-06-21T20:26:34Z","publicdate":"2007-06-21T00:00:00Z","datefirstpublished":"2007-06-22T21:56:21Z","dateupdated":"2008-09-08T18:26:28Z","revision":10,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"2","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"10","cam_impact":"5","cam_easeofexploitation":"6","cam_attackeraccessrequired":"17","cam_scorecurrent":"0.57375","cam_scorecurrentwidelyknown":"2.295","cam_scorecurrentwidelyknownexploited":"4.2075","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.57375,"vulnote":null}