Vulnerability Note VU#289988

Apple Safari cross-domain HTTP redirection race condition

Original Release date: 25 Jun 2007 | Last revised: 21 Sep 2007


Apple Safari contains a race condition when handling HTTP redirection when updating pages. This can allow a cross-domain violation.


Apple Safari contains a race condition when updating pages. When this race condition is used in combination with an HTTP redirection, Safari may allow JavaScript to modify content in another domain, which is a violation of the same-origin policy.

Note that this vulnerability is reported to only be in the Safari 3 beta, which is available for Mac OS X 10.4.9, Windows XP, and Vista.


By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an email attachment), an attacker may be able to execute script or obtain full access to content in a different domain. The impact is similar to that of a cross-site scripting vulnerability. This includes the ability to spoof or modify web content, access website information such as cookies, or retrieve data from an encrypted HTTPS connection. For a more detailed description of the impact of cross-site scripting vulnerabilities, please see CERT Advisory CA-2000-02.


Apply an update
This issue is addressed by Apple Safari Beta Update 3.0.2.

Disable JavaScript

This vulnerability can be mitigated in Safari by disabling JavaScript. Guidelines for setting preferences in Safari can be found in the "Securing Your Web Browser" document.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer, Inc.Affected-25 Jun 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by Apple, who in turn credit Lawrence Lai, Stan Switzer, and Ed Rowe of Adobe Systems, Inc.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2007-2400
  • Date Public: 25 Jun 2007
  • Date First Published: 25 Jun 2007
  • Date Last Updated: 21 Sep 2007
  • Severity Metric: 0.47
  • Document Revision: 11


If you have feedback, comments, or additional information about this vulnerability, please send us email.