Vulnerability Name: | CVE-2016-1699 (CCN-113728) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-06-01 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2016-06-01 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-10-30 | ||||||||||||||||||||||||||||||||||||||||
Summary: | WebKit/Source/devtools/front_end/devtools.js in the Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 51.0.2704.79, does not ensure that the remoteFrontendUrl parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-284 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-1699 Source: CCN Type: Google Chrome Releases Web site Stable Channel Update Source: CONFIRM Type: Vendor Advisory http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html Source: SUSE Type: Third Party Advisory openSUSE-SU-2016:1489 Source: SUSE Type: Third Party Advisory SUSE-SU-2016:1490 Source: SUSE Type: Third Party Advisory openSUSE-SU-2016:1496 Source: CCN Type: RHSA-2016-1201 Important: chromium-browser security update Source: DEBIAN Type: Third Party Advisory DSA-3594 Source: SECTRACK Type: Third Party Advisory 1036026 Source: UBUNTU Type: Third Party Advisory USN-2992-1 Source: REDHAT Type: Third Party Advisory RHSA-2016:1201 Source: CONFIRM Type: Issue Tracking https://codereview.chromium.org/2010783002 Source: CONFIRM Type: Permissions Required https://crbug.com/607939 Source: XF Type: UNKNOWN google-chrome-cve20161699-code-exec(113728) Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-1699 Source: CCN Type: ZDI-18-216 Trend Micro Maximum Security Regex Matching Use-After-Free Remote Code Execution Vulnerability Source: CCN Type: ZDI-19-006 Microsoft Windows JET Database Engine Out-Of-Bounds Write Remote Code Execution Vulnerability | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |