CVE-2021-33593 (GCVE-0-2021-33593)
Vulnerability from cvelistv5
Published
2021-11-02 06:20
Modified
2024-08-03 23:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-451 - User Interface (UI) Misrepresentation of Critical Information
Summary
Whale browser for iOS before 1.14.0 has an inconsistent user interface issue that allows an attacker to obfuscate the address bar which may lead to address bar spoofing.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
NAVER | NAVER Whale browser |
Version: unspecified < 1.14.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cve.naver.com/detail/cve-2021-43059" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NAVER Whale browser", "vendor": "NAVER", "versions": [ { "lessThan": "1.14.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "YoKo Kho from Telkom Indonesia" } ], "descriptions": [ { "lang": "en", "value": "Whale browser for iOS before 1.14.0 has an inconsistent user interface issue that allows an attacker to obfuscate the address bar which may lead to address bar spoofing." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-451", "description": "CWE-451: User Interface (UI) Misrepresentation of Critical Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-02T06:20:09", "orgId": "f9629fae-ca2e-4fbf-9785-3ed86476aef6", "shortName": "naver" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cve.naver.com/detail/cve-2021-43059" } ], "source": { "discovery": "EXTERNAL" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@navercorp.com", "ID": "CVE-2021-33593", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NAVER Whale browser", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.14.0" } ] } } ] }, "vendor_name": "NAVER" } ] } }, "credit": [ { "lang": "eng", "value": "YoKo Kho from Telkom Indonesia" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Whale browser for iOS before 1.14.0 has an inconsistent user interface issue that allows an attacker to obfuscate the address bar which may lead to address bar spoofing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-451: User Interface (UI) Misrepresentation of Critical Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://cve.naver.com/detail/cve-2021-43059", "refsource": "CONFIRM", "url": "https://cve.naver.com/detail/cve-2021-43059" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f9629fae-ca2e-4fbf-9785-3ed86476aef6", "assignerShortName": "naver", "cveId": "CVE-2021-33593", "datePublished": "2021-11-02T06:20:09", "dateReserved": "2021-05-27T00:00:00", "dateUpdated": "2024-08-03T23:50:43.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-33593\",\"sourceIdentifier\":\"cve@navercorp.com\",\"published\":\"2021-11-02T07:15:07.220\",\"lastModified\":\"2024-11-21T06:09:09.720\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Whale browser for iOS before 1.14.0 has an inconsistent user interface issue that allows an attacker to obfuscate the address bar which may lead to address bar spoofing.\"},{\"lang\":\"es\",\"value\":\"Whale browser para iOS versiones anteriores a 1.14.0 presenta un problema de inconsistencia en la interfaz de usuario que permite a un atacante ofuscar la barra de direcciones, que puede conllevar a una suplantaci\u00f3n de la barra de direcciones\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cve@navercorp.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-451\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:navercorp:whale:*:*:*:*:*:iphone_os:*:*\",\"versionEndExcluding\":\"1.14.0\",\"matchCriteriaId\":\"549F9B1E-B0BF-40BB-B8C6-D693393A2F52\"}]}]}],\"references\":[{\"url\":\"https://cve.naver.com/detail/cve-2021-43059\",\"source\":\"cve@navercorp.com\",\"tags\":[\"Broken Link\",\"Not Applicable\"]},{\"url\":\"https://cve.naver.com/detail/cve-2021-43059\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Not Applicable\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…