An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, Safari 17.1, macOS Sonoma 14.1. Visiting a malicious website may lead to address bar spoofing.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/03/26/1 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/ | Mailing List |
https://support.apple.com/en-us/HT213981 | Vendor Advisory |
https://support.apple.com/en-us/HT213982 | Vendor Advisory |
https://support.apple.com/en-us/HT213984 | Vendor Advisory |
https://support.apple.com/en-us/HT213986 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/03/26/1 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/ | Mailing List |
https://support.apple.com/en-us/HT213981 | Vendor Advisory |
https://support.apple.com/en-us/HT213982 | Vendor Advisory |
https://support.apple.com/en-us/HT213984 | Vendor Advisory |
https://support.apple.com/en-us/HT213986 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
09 Dec 2024, 17:31
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
CPE | cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:* cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:* cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* |
|
First Time |
Apple ipad Os
Wpewebkit wpe Webkit Fedoraproject fedora Apple macos Webkitgtk webkitgtk Apple iphone Os Apple safari Wpewebkit Apple Fedoraproject Webkitgtk |
|
References | () http://www.openwall.com/lists/oss-security/2024/03/26/1 - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/ - Mailing List | |
References | () https://support.apple.com/en-us/HT213981 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213982 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213984 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213986 - Vendor Advisory |
Information
Published : 2024-02-21 07:15
Updated : 2024-12-09 17:31
NVD link : CVE-2023-42843
Mitre link : CVE-2023-42843
CVE.ORG link : CVE-2023-42843
JSON object : View
Products Affected
wpewebkit
- wpe_webkit
fedoraproject
- fedora
apple
- macos
- ipad_os
- safari
- iphone_os
webkitgtk
- webkitgtk
CWE
CWE-290
Authentication Bypass by Spoofing