Описание
Microsoft Edge Security Feature Bypass Vulnerability
A security feature bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins. The vulnerability allows Microsoft Edge to bypass Same-Origin Policy (SOP) restrictions, and to allow requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force the browser to send data that would otherwise be restricted.
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. The attacker could also take advantage of compromised websites, and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.
The security update addresses the vulnerability by modifying how affected Microsoft Edge handles different-origin requests.
FAQ
After I installed the security update and restarted my device, third-party cookies are no longer blocked even though I had previously selected that setting. What do I do?
In some cases, after installing the security updates, sites you visit might still be able to use third-party cookies that they originally set on your browser before Microsoft updated the setting. To learn more and to reset your browser cookies, see Microsoft Knowledge Base article 4464209.
Guidance for Enterprise Admins:
Enterprise admins can optionally choose to show a warning dialog to users in their environments that informs them about this issue. This dialog will be displayed on the first launch of Microsoft Edge after the Windows 10 October Update has been installed on the users' machines, and will only be shown to users who had previously set the Block only third party cookies setting in Microsoft Edge.
To show this warning dialog, Enterprise admins need to configure and deploy the following reg key:
HKEY_CURRENT_USER\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\ ThirdPartyCookiesMessageManagedOptIn
The value DWORD (32-bit) registry key should be set to 1.
Note that users in enterprises will not get any in-product notifications about this issue unless their admin configures and deploys this ThirdPartyCookiesMessageManagedOptIn registry value. This reg key will only display the notification on devices running Desktop and Mobile versions of Windows 10.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1703 for 32-bit Systems | ||
| Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1703 for x64-based Systems | ||
| Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for 32-bit Systems | ||
| Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for x64-based Systems | ||
| Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for 32-bit Systems | ||
| Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for x64-based Systems |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
EPSS
4.3 Medium
CVSS3
Связанные уязвимости
A security feature bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins, aka "Microsoft Edge Security Feature Bypass Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8512.
A security feature bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins, aka "Microsoft Edge Security Feature Bypass Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8512.
Уязвимость браузера Microsoft Edge, связанная с ошибками механизмов обработки запросов, позволяющая нарушителю раскрыть защищаемую информацию
EPSS
4.3 Medium
CVSS3