The CFNetwork Session component in Apple iOS before 8.3 and Apple OS X before 10.10.3 does not properly handle request headers during processing of redirects in HTTP responses, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://support.apple.com/HT204659 | vendor advisory |
http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html | vendor advisory |
http://www.securityfocus.com/bid/73984 | vdb entry |
http://www.securitytracker.com/id/1032048 | vdb entry |
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html | vendor advisory |
https://support.apple.com/HT204661 | vendor advisory |