var-201310-0496
Vulnerability from variot
WebKit in Apple Safari before 6.1 disables the Private Browsing feature upon a launch of the Web Inspector, which makes it easier for context-dependent attackers to obtain browsing information by leveraging LocalStorage/ files. This vulnerability Webkit Vulnerability in Webkit Other products that use may also be affected.By the attacker, LocalStorage/ Browsing information may be obtained by using the file. An attacker may exploit this issue by enticing victims into viewing a malicious webpage. Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0496", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "6.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "6.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "6.0" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "6.0.4" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "6.0.3" }, { "model": "safari", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "6.0.5" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "6.1 (apple mac os x server v10.7.5)" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "6.1 (apple mac os x v10.7.5)" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "6.1 (apple mac os x v10.8.5)" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "6.0.5" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" } ], "sources": [ { "db": "BID", "id": "63289" }, { "db": "JVNDB", "id": "JVNDB-2013-004871" }, { "db": "CNNVD", "id": "CNNVD-201310-606" }, { "db": "NVD", "id": "CVE-2013-5130" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:apple:safari", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004871" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Google Chrome Security Team", "sources": [ { "db": "BID", "id": "63289" } ], "trust": 0.3 }, "cve": "CVE-2013-5130", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2013-5130", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-65132", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-5130", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-5130", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201310-606", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-65132", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-65132" }, { "db": "JVNDB", "id": "JVNDB-2013-004871" }, { "db": "CNNVD", "id": "CNNVD-201310-606" }, { "db": "NVD", "id": "CVE-2013-5130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebKit in Apple Safari before 6.1 disables the Private Browsing feature upon a launch of the Web Inspector, which makes it easier for context-dependent attackers to obtain browsing information by leveraging LocalStorage/ files. This vulnerability Webkit Vulnerability in Webkit Other products that use may also be affected.By the attacker, LocalStorage/ Browsing information may be obtained by using the file. \nAn attacker may exploit this issue by enticing victims into viewing a malicious webpage. \nNote: Very limited information is currently available regarding this issue. We will update this BID as more information emerges. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome", "sources": [ { "db": "NVD", "id": "CVE-2013-5130" }, { "db": "JVNDB", "id": "JVNDB-2013-004871" }, { "db": "BID", "id": "63289" }, { "db": "VULHUB", "id": "VHN-65132" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5130", "trust": 2.8 }, { "db": "JVN", "id": "JVNVU95174988", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-004871", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201310-606", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2013-10-22-2", "trust": 0.6 }, { "db": "BID", "id": "63289", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-65132", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65132" }, { "db": "BID", "id": "63289" }, { "db": "JVNDB", "id": "JVNDB-2013-004871" }, { "db": "CNNVD", "id": "CNNVD-201310-606" }, { "db": "NVD", "id": "CVE-2013-5130" } ] }, "id": "VAR-201310-0496", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-65132" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:48:05.112000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2013-10-22-2", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html" }, { "title": "HT6000", "trust": 0.8, "url": "http://support.apple.com/kb/HT6000" }, { "title": "HT6000", "trust": 0.8, "url": "http://support.apple.com/kb/HT6000?viewlocale=ja_JP" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004871" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65132" }, { "db": "JVNDB", "id": "JVNDB-2013-004871" }, { "db": "NVD", "id": "CVE-2013-5130" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2013/oct/msg00003.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5130" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95174988/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5130" }, { "trust": 0.3, "url": "http://www.webkit.org/" }, { "trust": 0.3, "url": "http://prod.lists.apple.com/archives/security-announce/2013/oct/msg00003.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-65132" }, { "db": "BID", "id": "63289" }, { "db": "JVNDB", "id": "JVNDB-2013-004871" }, { "db": "CNNVD", "id": "CNNVD-201310-606" }, { "db": "NVD", "id": "CVE-2013-5130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-65132" }, { "db": "BID", "id": "63289" }, { "db": "JVNDB", "id": "JVNDB-2013-004871" }, { "db": "CNNVD", "id": "CNNVD-201310-606" }, { "db": "NVD", "id": "CVE-2013-5130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-24T00:00:00", "db": "VULHUB", "id": "VHN-65132" }, { "date": "2013-10-22T00:00:00", "db": "BID", "id": "63289" }, { "date": "2013-10-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004871" }, { "date": "2013-10-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-606" }, { "date": "2013-10-24T10:53:09.723000", "db": "NVD", "id": "CVE-2013-5130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-24T00:00:00", "db": "VULHUB", "id": "VHN-65132" }, { "date": "2013-10-22T00:00:00", "db": "BID", "id": "63289" }, { "date": "2013-10-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004871" }, { "date": "2013-10-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-606" }, { "date": "2024-11-21T01:57:04.587000", "db": "NVD", "id": "CVE-2013-5130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-606" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Safari Used in products such as WebKit Vulnerable to browsing information", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004871" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-606" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.