Red Hat Bugzilla – Bug 443774
CVE-2008-1025 WebKit: XSS via URLs with colon
Last modified: 2016-03-04 07:56:55 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-1025 to the following vulnerability:
Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a colon in the hostname portion.
Relevant part of Apple security advisory:
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5.2, Mac OS X Server v10.5.2, Windows XP or Vista
Impact: Visiting a malicious website may result in cross-site
Description: An issue exists in WebKit's handling of URLs containing
a colon character in the host name. Opening a maliciously crafted URL
may lead to a cross-site scripting attack. This update addresses the
issue through improved handling of URLs. Credit to Robert Swiecki of
the Google Security Team, and David Bloom for reporting this issue.
So far, I failed to find further details about this issue. Searching WebKit
trac does not show anything obvious either.
According to Apple Product Security team, this is relevant change set:
Should be included in WebKit-1.0.0-0.8.svn31787 in stable (F8) or on the way to
WebKit-1.0.0-0.8.svn31787 or newer is now in all current Fedora versions.