QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and data: URIs in Refresh and Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains a javascript: URI, (2) entering a javascript: URI when specifying the content of a Refresh header, (3) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header, (5) injecting a Location header that contains JavaScript sequences in a data:text/html URI, or (6) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2009-08-31T16:00:00

Updated: 2024-08-07T06:14:55.254Z

Reserved: 2009-08-31T00:00:00

Link: CVE-2009-3015

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2009-08-31T16:30:06.983

Modified: 2017-08-17T01:31:00.427

Link: CVE-2009-3015

cve-icon Redhat

No data.