|
Message-ID: <c20a5ac6-ec02-88ea-f6d4-713c93373904@igalia.com> Date: Mon, 31 Jan 2022 18:49:31 +0000 From: Carlos Alberto Lopez Perez <clopez@...lia.com> To: webkit-gtk@...ts.webkit.org, webkit-wpe@...ts.webkit.org Cc: security@...kit.org, distributor-list@...me.org, oss-security@...ts.openwall.com, bugtraq@...urityfocus.com Subject: Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0001 On 21/01/2022 16:53, Carlos Alberto Lopez Perez wrote: > CVE-2022-XXXXX > Versions affected: WebKitGTK and WPE WebKit before 2.34.4. > Credit to Martin Bajanik from fingerprintjs.com. > Impact: A malicious website may exfiltrate data cross-origin. > Description: A cross-origin issue existed with the IndexedDB. This > was addressed with improved checking of security origins. > Notes: There is a public PoC demonstrating this issue at > https://safarileaks.com so this issue may have been actively > exploited. We still don't know the CVE number that will be assigned > to this issue. We will update this advisory once we know it. The data for the above unknown CVE number is now updated with the info below: CVE-2022-22594 Versions affected: WebKitGTK and WPE WebKit before 2.34.4. Credit to Martin Bajanik of fingerprintjs.com. Impact: A website may be able to track sensitive user information. Description: A cross-origin issue in the IndexDB API was addressed with improved input validation. Notes: There is a public PoC demonstrating this issue at safarileaks.com so it may have been actively exploited.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.