CVE-2010-3813 (CNNVD-201011-220)
中文标题:
Apple Safari WebKit权限许可和访问控制漏洞
英文标题:
The WebCore::HTMLLinkElement::process function in WebCore/html/HTMLLinkElement.cpp in WebKit, as use...
漏洞描述
中文描述:
WebKit是KDE、苹果(Apple)、谷歌(Google)等公司共同开发的一套开源Web浏览器引擎,目前被Apple Safari及Google Chrome等浏览器使用。Apple Apple Safari是美国苹果(Apple)公司开发的一款Web浏览器,是Mac OS X和iOS操作系统附带的默认浏览器。Mac OS X是一款由Apple公司开发和维护的源自BSD的操作系统。 基于Mac OS X 10.5至10.6版本以及Windows平台的Apple Safari 5.0.3之前版本,基于Mac OS X 10.4版本平台的4.1.3之前版本,以及webkitgtk 1.2.6之前版本中的WebKit的WebCore/html/HTMLLinkElement.cpp中的WebCore::HTMLLinkElement::process函数在处理HTML LINK元素时没有验证DNS预读取是否启用。远程攻击者可利用该漏洞绕过预设的访问限制。
英文描述:
The WebCore::HTMLLinkElement::process function in WebCore/html/HTMLLinkElement.cpp in WebKit, as used in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4; webkitgtk before 1.2.6; and possibly other products does not verify whether DNS prefetching is enabled when processing an HTML LINK element, which allows remote attackers to bypass intended access restrictions, as demonstrated by an HTML e-mail message that uses a LINK element for X-Confirm-Reading-To functionality.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| apple | safari | * | - | - |
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
|
| apple | safari | 5.0 | - | - |
cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*
|
| apple | safari | 5.0.1 | - | - |
cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*
|
| apple | webkit | * | - | - |
cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*
|
| apple | safari | 1.0 | - | - |
cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*
|
| apple | safari | 1.0.0 | - | - |
cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*
|
| apple | safari | 1.0.0b1 | - | - |
cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*
|
| apple | safari | 1.0.0b2 | - | - |
cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*
|
| apple | safari | 1.0.1 | - | - |
cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*
|
| apple | safari | 1.0.2 | - | - |
cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*
|
| apple | safari | 1.0.3 | - | - |
cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*
|
| apple | safari | 1.1 | - | - |
cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*
|
| apple | safari | 1.1.0 | - | - |
cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*
|
| apple | safari | 1.1.1 | - | - |
cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*
|
| apple | safari | 1.2 | - | - |
cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*
|
| apple | safari | 1.2.0 | - | - |
cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*
|
| apple | safari | 1.2.1 | - | - |
cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*
|
| apple | safari | 1.2.2 | - | - |
cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*
|
| apple | safari | 1.2.3 | - | - |
cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*
|
| apple | safari | 1.2.4 | - | - |
cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*
|
| apple | safari | 1.2.5 | - | - |
cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*
|
| apple | safari | 1.3 | - | - |
cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*
|
| apple | safari | 1.3.0 | - | - |
cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*
|
| apple | safari | 1.3.1 | - | - |
cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*
|
| apple | safari | 1.3.2 | - | - |
cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*
|
| apple | safari | 2 | - | - |
cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*
|
| apple | safari | 2.0 | - | - |
cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
|
| apple | safari | 2.0.0 | - | - |
cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
|
| apple | safari | 2.0.1 | - | - |
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
|
| apple | safari | 2.0.2 | - | - |
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
|
| apple | safari | 2.0.3 | - | - |
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
|
| apple | safari | 2.0.4 | - | - |
cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
|
| apple | safari | 3 | - | - |
cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*
|
| apple | safari | 3.0 | - | - |
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
|
| apple | safari | 3.0.0 | - | - |
cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
|
| apple | safari | 3.0.0b | - | - |
cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*
|
| apple | safari | 3.0.1 | - | - |
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
|
| apple | safari | 3.0.1b | - | - |
cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*
|
| apple | safari | 3.0.2 | - | - |
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
|
| apple | safari | 3.0.2b | - | - |
cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*
|
| apple | safari | 3.0.3 | - | - |
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
|
| apple | safari | 3.0.3b | - | - |
cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*
|
| apple | safari | 3.0.4 | - | - |
cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
|
| apple | safari | 3.0.4b | - | - |
cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*
|
| apple | safari | 3.1.0 | - | - |
cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
|
| apple | safari | 3.1.0b | - | - |
cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*
|
| apple | safari | 3.1.1 | - | - |
cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
|
| apple | safari | 3.1.2 | - | - |
cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
|
| apple | safari | 3.2.0 | - | - |
cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
|
| apple | safari | 3.2.1 | - | - |
cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*
|
| apple | safari | 3.2.2 | - | - |
cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*
|
| apple | safari | 4.1 | - | - |
cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*
|
| apple | safari | 4.1.1 | - | - |
cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
AV:N/AC:M/Au:N/C:P/I:P/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2010-3813 |
2025-11-11 15:18:18 | 2025-11-11 07:33:10 |
| NVD | nvd_CVE-2010-3813 |
2025-11-11 14:53:27 | 2025-11-11 07:41:59 |
| CNNVD | cnnvd_CNNVD-201011-220 |
2025-11-11 15:09:11 | 2025-11-11 07:49:47 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201011-220
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.8
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:P/I:P/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 53
- data_sources: ['cve'] -> ['cve', 'nvd']