Description
html/parser/XSSAuditor.cpp in WebCore in WebKit, as used in Google Chrome through 22 and Safari 5.1.7, does not consider all possible output contexts of reflected data, which makes it easier for remote attackers to bypass a cross-site scripting (XSS) protection mechanism via a crafted string, aka rdar problem 12019108.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Tushar Dalvi · textwebappsphp
https://www.exploit-db.com/exploits/38024
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/80072
Exploit x_refsource_misc
http://blog.opensecurityresearch.com/2012/09/simple-cross-site-scripting-vector-that.html
Exploit x_refsource_confirm
https://bugs.webkit.org/show_bug.cgi?id=92692
Scores
EPSS
0.0034
EPSS Percentile
57.1%
Details
CWE
CWE-79
Status
published
Products (50)
apple/safari
5.1.7
apple/webkit
google/chrome
22.0.1229.0
google/chrome
22.0.1229.1
google/chrome
22.0.1229.2
google/chrome
22.0.1229.3
google/chrome
22.0.1229.4
google/chrome
22.0.1229.6
google/chrome
22.0.1229.7
google/chrome
22.0.1229.8
... and 40 more
Published
Nov 15, 2012
Tracked Since
Feb 18, 2026