| Vulnerability Name: | CVE-2015-1297 (CCN-106005) | ||||||||||||||||||||||||||||||||
| Assigned: | 2015-09-01 | ||||||||||||||||||||||||||||||||
| Published: | 2015-09-01 | ||||||||||||||||||||||||||||||||
| Updated: | 2016-12-22 | ||||||||||||||||||||||||||||||||
| Summary: | The WebRequest API implementation in extensions/browser/api/web_request/web_request_api.cc in Google Chrome before 45.0.2454.85 does not properly consider a request's source before accepting the request, which allows remote attackers to bypass intended access restrictions via a crafted (1) app or (2) extension. | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) 3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-254 | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Other | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2015-1297 Source: CCN Type: Google Chrome Releases Web site Stable Channel Update Source: CONFIRM Type: Patch, Vendor Advisory http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html Source: SUSE Type: UNKNOWN openSUSE-SU-2015:1586 Source: SUSE Type: UNKNOWN openSUSE-SU-2015:1873 Source: REDHAT Type: UNKNOWN RHSA-2015:1712 Source: DEBIAN Type: UNKNOWN DSA-3351 Source: SECTRACK Type: UNKNOWN 1033472 Source: CONFIRM Type: UNKNOWN https://code.google.com/p/chromium/issues/detail?id=510802 Source: CONFIRM Type: UNKNOWN https://codereview.chromium.org/1267183003/ Source: XF Type: UNKNOWN google-chrome-cve20151297-unspec(106005) Source: GENTOO Type: UNKNOWN GLSA-201603-09 Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-1297 | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||