Search for vulnerabilities
Vulnerability details: VCID-e3ue-xqxr-aaak
Vulnerability ID VCID-e3ue-xqxr-aaak
Aliases CVE-2018-4233
Summary An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
Status Published
Exploitability 2.0
Weighted Severity 7.9
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-4233.html
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.01760 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.06080 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.06080 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.06080 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.06080 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.82147 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.88155 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.88155 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.88155 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.88155 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.88155 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.88155 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.88155 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
epss 0.88155 https://api.first.org/data/v1/epss?cve=CVE-2018-4233
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4233
cvssv3 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2018-4233
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2018-4233
generic_textual Medium https://support.apple.com/HT208848
generic_textual Medium https://support.apple.com/HT208850
generic_textual Medium https://support.apple.com/HT208851
generic_textual Medium https://support.apple.com/HT208852
generic_textual Medium https://support.apple.com/HT208853
generic_textual Medium https://support.apple.com/HT208854
generic_textual Medium https://ubuntu.com/security/notices/USN-3687-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-3687-1
generic_textual Medium https://webkitgtk.org/security/WSA-2018-0005.html
generic_textual Medium http://www.securitytracker.com/id/1041029
Reference id Reference type URL
http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-4233.html
https://api.first.org/data/v1/epss?cve=CVE-2018-4233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4233
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://security.gentoo.org/glsa/201808-04
https://support.apple.com/HT208848
https://support.apple.com/HT208850
https://support.apple.com/HT208851
https://support.apple.com/HT208852
https://support.apple.com/HT208853
https://support.apple.com/HT208854
https://ubuntu.com/security/notices/USN-3687-1
https://usn.ubuntu.com/3687-1/
https://usn.ubuntu.com/usn/usn-3687-1
https://webkitgtk.org/security/WSA-2018-0005.html
https://www.exploit-db.com/exploits/45998/
http://www.securitytracker.com/id/1041029
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
CVE-2018-4233 https://nvd.nist.gov/vuln/detail/CVE-2018-4233
Data source Exploit-DB
Date added Dec. 14, 2018
Description Safari - Proxy Object Type Confusion (Metasploit)
Ransomware campaign use Known
Source publication date Dec. 14, 2018
Exploit type remote
Platform macos
Source update date Dec. 14, 2018
Source URL https://raw.githubusercontent.com/rapid7/metasploit-framework/cc7cb7302ef43478292f684f473fadb00f9b4344/modules/exploits/osx/browser/safari_proxy_object_type_confusion.rb
Data source Metasploit
Description This module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion (CVE-2018-4233). The JIT region is then replaced with shellcode which loads the second stage. The second stage exploits a logic error in libxpc, which uses command execution via the launchd's "spawn_via_launchd" API (CVE-2018-4404).
Note
{}
Ransomware campaign use Unknown
Source publication date March 15, 2018
Platform OSX
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/osx/browser/safari_proxy_object_type_confusion.rb
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-4233
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-4233
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.88357
EPSS Score 0.01760
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.