An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, Safari 17.1, macOS Sonoma 14.1. Visiting a malicious website may lead to address bar spoofing.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/03/26/1 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2024/03/26/1 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/ | Mailing List |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/ | Mailing List |
https://support.apple.com/en-us/HT213981 | Vendor Advisory |
https://support.apple.com/en-us/HT213981 | Vendor Advisory |
https://support.apple.com/en-us/HT213982 | Vendor Advisory |
https://support.apple.com/en-us/HT213982 | Vendor Advisory |
https://support.apple.com/en-us/HT213984 | Vendor Advisory |
https://support.apple.com/en-us/HT213984 | Vendor Advisory |
https://support.apple.com/en-us/HT213986 | Vendor Advisory |
https://support.apple.com/en-us/HT213986 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
09 Dec 2024, 17:31
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-290 | |
References | () https://support.apple.com/en-us/HT213984 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213986 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213981 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/26/1 - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/ - Mailing List | |
References | () https://support.apple.com/en-us/HT213982 - Vendor Advisory | |
CPE | cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:* cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
First Time |
Webkitgtk webkitgtk
Fedoraproject Apple ipad Os Apple macos Apple Webkitgtk Fedoraproject fedora Wpewebkit wpe Webkit Apple safari Apple iphone Os Wpewebkit |
07 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Feb 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-21 07:15
Updated : 2024-12-09 17:31
NVD link : CVE-2023-42843
Mitre link : CVE-2023-42843
JSON object : View
Products Affected
fedoraproject
- fedora
apple
- ipad_os
- safari
- macos
- iphone_os
webkitgtk
- webkitgtk
wpewebkit
- wpe_webkit
CWE
CWE-290
Authentication Bypass by Spoofing