Vulnerability Name:

CVE-2015-3754 (CCN-105635)

Assigned:2015-08-11
Published:2015-08-11
Updated:2019-02-07
Summary:The private-browsing implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8 does not prevent caching of HTTP authentication credentials, which makes it easier for remote attackers to track users via a crafted web site.
CVSS v3 Severity:4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:U)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2015-3754

Source: APPLE
Type: Mailing List, Vendor Advisory
APPLE-SA-2015-08-13-1

Source: SUSE
Type: Mailing List, Third Party Advisory
openSUSE-SU-2016:0761

Source: BID
Type: Third Party Advisory, VDB Entry
76339

Source: CCN
Type: BID-76339
Apple Safari WebKit Page Loading Information Disclosure Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1033274

Source: XF
Type: UNKNOWN
apple-safari-cve20153754-info-disc(105635)

Source: CCN
Type: Apple Web site
About the security content of Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8

Source: CONFIRM
Type: Vendor Advisory
https://support.apple.com/kb/HT205033

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apple:safari:*:*:*:*:*:*:*:* (Version >= 6.0 and < 6.2.8)
  • OR cpe:/a:apple:safari:*:*:*:*:*:*:*:* (Version >= 7.0 and < 7.1.8)
  • OR cpe:/a:apple:safari:*:*:*:*:*:*:*:* (Version >= 8.0 and < 8.0.8)

  • Configuration CCN 1:
  • cpe:/a:apple:safari:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:8.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20153754
    V
    CVE-2015-3754
    2018-05-02
    oval:com.ubuntu.precise:def:20153754000
    V
    CVE-2015-3754 on Ubuntu 12.04 LTS (precise) - medium.
    2015-08-16
    oval:com.ubuntu.xenial:def:201537540000000
    V
    CVE-2015-3754 on Ubuntu 16.04 LTS (xenial) - medium.
    2015-08-16
    oval:com.ubuntu.trusty:def:20153754000
    V
    CVE-2015-3754 on Ubuntu 14.04 LTS (trusty) - medium.
    2015-08-16
    oval:com.ubuntu.xenial:def:20153754000
    V
    CVE-2015-3754 on Ubuntu 16.04 LTS (xenial) - medium.
    2015-08-16
    BACK
    apple safari *
    apple safari *
    apple safari *
    apple safari 6.0
    apple safari 7.0
    apple safari 8.0