The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2015-0816.html | vendor-advisory x_refsource_REDHAT |
https://code.google.com/p/chromium/issues/detail?id=456518 | x_refsource_CONFIRM |
http://www.debian.org/security/2015/dsa-3238 | vendor-advisory x_refsource_DEBIAN |
https://src.chromium.org/viewvc/blink?revision=190980&view=revision | x_refsource_CONFIRM |
http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html | vendor-advisory x_refsource_SUSE |
https://security.gentoo.org/glsa/201506-04 | vendor-advisory x_refsource_GENTOO |
http://www.securitytracker.com/id/1032209 | vdb-entry x_refsource_SECTRACK |
http://ubuntu.com/usn/USN-2570-1 | vendor-advisory x_refsource_UBUNTU |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html | vendor-advisory x_refsource_SUSE |
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2015-0816.html | vendor-advisory x_refsource_REDHAT x_transferred |
https://code.google.com/p/chromium/issues/detail?id=456518 | x_refsource_CONFIRM x_transferred |
http://www.debian.org/security/2015/dsa-3238 | vendor-advisory x_refsource_DEBIAN x_transferred |
https://src.chromium.org/viewvc/blink?revision=190980&view=revision | x_refsource_CONFIRM x_transferred |
http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html | vendor-advisory x_refsource_SUSE x_transferred |
https://security.gentoo.org/glsa/201506-04 | vendor-advisory x_refsource_GENTOO x_transferred |
http://www.securitytracker.com/id/1032209 | vdb-entry x_refsource_SECTRACK x_transferred |
http://ubuntu.com/usn/USN-2570-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html | vendor-advisory x_refsource_SUSE x_transferred |
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html | x_refsource_CONFIRM x_transferred |
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |