ID

VAR-201306-0223


CVE

CVE-2013-1013


TITLE

Apple Safari Used in products such as WebKit of XSS Auditor Vulnerabilities triggered by unintended form submission

Trust: 0.8

sources: JVNDB: JVNDB-2013-002892

DESCRIPTION

XSS Auditor in WebKit in Apple Safari before 6.0.5 does not properly rewrite URLs, which allows remote attackers to trigger unintended form submissions via unspecified vectors. This vulnerability Webkit Vulnerability in Webkit Other products that use may also be affected.An unintended form submission may be triggered by a third party. WebKit is prone to an unspecified cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in an unsuspecting user's browser in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Note: This issue was previously covered in BID 60330 (Apple Safari Prior to 6.0.5 Multiple Security Vulnerabilities) but has been given its own record to better document it. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. A remote attacker could exploit this vulnerability to trigger unscheduled form submissions. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-06-04-2 Safari 6.0.5 Safari 6.0.5 is now available and addresses the following: WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.3 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2013-0879 : Atte Kettunen of OUSPG CVE-2013-0991 : Jay Civelli of the Chromium development community CVE-2013-0992 : Google Chrome Security Team (Martin Barbella) CVE-2013-0993 : Google Chrome Security Team (Inferno) CVE-2013-0994 : David German of Google CVE-2013-0995 : Google Chrome Security Team (Inferno) CVE-2013-0996 : Google Chrome Security Team (Inferno) CVE-2013-0997 : Vitaliy Toropov working with HP's Zero Day Initiative CVE-2013-0998 : pa_kt working with HP's Zero Day Initiative CVE-2013-0999 : pa_kt working with HP's Zero Day Initiative CVE-2013-1000 : Fermin J. Serna of the Google Security Team CVE-2013-1001 : Ryan Humenick CVE-2013-1002 : Sergey Glazunov CVE-2013-1003 : Google Chrome Security Team (Inferno) CVE-2013-1004 : Google Chrome Security Team (Martin Barbella) CVE-2013-1005 : Google Chrome Security Team (Martin Barbella) CVE-2013-1006 : Google Chrome Security Team (Martin Barbella) CVE-2013-1007 : Google Chrome Security Team (Inferno) CVE-2013-1008 : Sergey Glazunov CVE-2013-1009 : Apple CVE-2013-1010 : miaubiz CVE-2013-1011 : Google Chrome Security Team (Inferno) CVE-2013-1023 : Google Chrome Security Team (Inferno) WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.3 Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-site scripting issue existed in the handling of iframes. This issue was addressed through improved origin tracking. CVE-ID CVE-2013-1012 : Subodh Iyengar and Erling Ellingsen of Facebook WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.3 Impact: Copying and pasting a malicious HTML snippet may lead to a cross-site scripting attack Description: A cross-site scripting issue existed in the handling of copied and pasted data in HTML documents. This issue was addressed through additional validation of pasted content. CVE-ID CVE-2013-0926 : Aditya Gupta, Subho Halder, and Dev Kar of xys3c (xysec.com) WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.3 Impact: Following a maliciously crafted link could lead to unexpected behavior on the target site Description: XSS Auditor may rewrite URLs to prevent cross-site scripting attacks. This may lead to a malicious alteration of the behavior of a form submission. This issue was addressed through improved validation of URLs. CVE-ID CVE-2013-1013 : Sam Power of Pentest Limited For OS X Lion systems Safari 6.0.5 is available via the Apple Software Update application. For OS X Mountain Lion systems Safari 6.0.5 is included with OS X v10.8.4. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJRrjeeAAoJEPefwLHPlZEwCm4P/3WseW2DFgYieiAHghpGQ07e /XuNWzqld4CpXyFUQDkw55DU1Y9dVIIl663rSR0VyXJDB5dMh6iHEBRHX4tarGym beZS0cDuakospFtX4MZgcKXu/8cV7b8lq9tzqH0pL419a61Fjhm1eRfDeM3snXkO kNCRi3nqOCmMroUiY+cJlKHi1x/t+2whISSM3QsIgpU5yyjEU3neMy2TPjuxC48h XZr9XaDX5cztv0MWCX+jkv+OpYPxVtPxBVw6rPLaX2eg7iwBM6yDbLF5i/4oY06t HzF2uCk8TlbFdk05Cr7HxmYV2qBei8VkcO1Mc4Ij3v3Q9iiKBRkr+d0CYQ1HSkrY igfCmfDiEpaKZfzCgwRsVFZ/UhuXTDipTFIzKrZSlbsglVyIQJtKVyyWEZDOKcYL kKCAS+ep0UyFIyeCCjFknd2hMneMR7a4u2XGJm1VtfRCA+ed3Cr0ROS+O9viGjYi Qcm+2yzlWg9vpfojv+uX+aqh6IsprhfqXuF4ypM6D98IQ3fJqx9a0tVIPniFaLuP O39M+UGtPLAw7BMiKkb4XyEajKFwJt1pfddWkC1YjKjtyRGf62BDOtY2KqEsyzpF 5nOzM3Vc+3urbur+69oqJLwRwC/PHkh1ym3LjrmqUW7+okckIGCQGt3iUwIWNKhp 2YgKISKdQYxVSfkzkqYY =jk2e -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2013-1013 // JVNDB: JVNDB-2013-002892 // BID: 60363 // VULHUB: VHN-61015 // PACKETSTORM: 121925

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 1.9

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:6.0

Trust: 1.9

vendor:applemodel:safariscope:lteversion:6.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 0.9

vendor:applemodel:safariscope:ltversion:6.0.5

Trust: 0.8

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:6.0.5

Trust: 0.3

vendor:applemodel:safariscope:neversion:6.0.5

Trust: 0.3

sources: BID: 60363 // JVNDB: JVNDB-2013-002892 // CNNVD: CNNVD-201306-085 // NVD: CVE-2013-1013

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1013
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-1013
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201306-085
value: MEDIUM

Trust: 0.6

VULHUB: VHN-61015
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-1013
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61015
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61015 // JVNDB: JVNDB-2013-002892 // CNNVD: CNNVD-201306-085 // NVD: CVE-2013-1013

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-61015 // JVNDB: JVNDB-2013-002892 // NVD: CVE-2013-1013

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201306-085

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201306-085

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002892

PATCH

title:APPLE-SA-2013-06-04-2url:http://lists.apple.com/archives/security-announce/2013/Jun/msg00001.html

Trust: 0.8

title:HT5785url:http://support.apple.com/kb/HT5785

Trust: 0.8

title:HT5785url:http://support.apple.com/kb/HT5785?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2013-002892

EXTERNAL IDS

db:NVDid:CVE-2013-1013

Trust: 2.9

db:JVNDBid:JVNDB-2013-002892

Trust: 0.8

db:CNNVDid:CNNVD-201306-085

Trust: 0.7

db:APPLEid:APPLE-SA-2013-06-04-2

Trust: 0.6

db:SECUNIAid:53711

Trust: 0.6

db:BIDid:60363

Trust: 0.4

db:VULHUBid:VHN-61015

Trust: 0.1

db:PACKETSTORMid:121925

Trust: 0.1

sources: VULHUB: VHN-61015 // BID: 60363 // JVNDB: JVNDB-2013-002892 // PACKETSTORM: 121925 // CNNVD: CNNVD-201306-085 // NVD: CVE-2013-1013

REFERENCES

url:http://support.apple.com/kb/ht5785

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2013/jun/msg00001.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1013

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1013

Trust: 0.8

url:http://secunia.com/advisories/53711

Trust: 0.6

url:http://www.webkit.org/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-0997

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1001

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0995

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0992

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1003

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1012

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1005

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1011

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0993

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1004

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0991

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1013

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0999

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1009

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0994

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1007

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0926

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0998

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1006

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1008

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1023

Trust: 0.1

sources: VULHUB: VHN-61015 // BID: 60363 // JVNDB: JVNDB-2013-002892 // PACKETSTORM: 121925 // CNNVD: CNNVD-201306-085 // NVD: CVE-2013-1013

CREDITS

Sam Power of Pentest Limited

Trust: 0.3

sources: BID: 60363

SOURCES

db:VULHUBid:VHN-61015
db:BIDid:60363
db:JVNDBid:JVNDB-2013-002892
db:PACKETSTORMid:121925
db:CNNVDid:CNNVD-201306-085
db:NVDid:CVE-2013-1013

LAST UPDATE DATE

2025-04-11T20:04:20.346000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-61015date:2013-06-05T00:00:00
db:BIDid:60363date:2013-06-05T00:00:00
db:JVNDBid:JVNDB-2013-002892date:2013-06-06T00:00:00
db:CNNVDid:CNNVD-201306-085date:2013-06-06T00:00:00
db:NVDid:CVE-2013-1013date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-61015date:2013-06-05T00:00:00
db:BIDid:60363date:2013-06-05T00:00:00
db:JVNDBid:JVNDB-2013-002892date:2013-06-06T00:00:00
db:PACKETSTORMid:121925date:2013-06-06T14:44:44
db:CNNVDid:CNNVD-201306-085date:2013-06-06T00:00:00
db:NVDid:CVE-2013-1013date:2013-06-05T14:39:55.603