Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j459-hg6r-rr22

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.

The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.

EPSS

Процентиль: 76%
0.0094
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
около 10 лет назад

The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.

redhat
около 10 лет назад

The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.

nvd
около 10 лет назад

The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.

debian
около 10 лет назад

The WebPageSerializerImpl::openTagToString function in WebKit/Source/w ...

fstec
около 10 лет назад

Уязвимость браузера Google Chrome, позволяющая нарушителю внедрить произвольный Веб- или HTML-код

EPSS

Процентиль: 76%
0.0094
Низкий

Дефекты

CWE-20