Cross-domain vulnerability in the WorkerPool API in Google Gears before 0.5.4.2 allows remote attackers to bypass the Same Origin Policy and the intended access restrictions of the allowCrossOrigin function by hosting an assumed-safe file type containing Google Gear commands on the target domain, then accessing that file from the attacking domain, whose response headers are not checked and cause the worker code to run in the target domain.
Advisories
Source ID Title
EUVD EUVD EUVD-2008-6479 Cross-domain vulnerability in the WorkerPool API in Google Gears before 0.5.4.2 allows remote attackers to bypass the Same Origin Policy and the intended access restrictions of the allowCrossOrigin function by hosting an assumed-safe file type containing Google Gear commands on the target domain, then accessing that file from the attacking domain, whose response headers are not checked and cause the worker code to run in the target domain.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T11:34:46.384Z

Reserved: 2009-03-24T00:00:00

Link: CVE-2008-6512

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2009-03-24T14:30:00.187

Modified: 2025-04-09T00:30:58.490

Link: CVE-2008-6512

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses