Описание
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-1268
- https://code.google.com/p/chromium/issues/detail?id=494640
- https://security.gentoo.org/glsa/201507-18
- https://src.chromium.org/viewvc/blink?revision=196373&view=revision
- http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00057.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00012.html
- http://rhn.redhat.com/errata/RHSA-2015-1188.html
- http://www.debian.org/security/2015/dsa-3315
- http://www.securityfocus.com/bid/75332
- http://www.securitytracker.com/id/1032731
- http://www.ubuntu.com/usn/USN-2652-1
EPSS
CVE ID
Связанные уязвимости
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before ...
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти ограничения доступа
EPSS