Описание
The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 47.0.2526.106-0ubuntu1.1221 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [47.0.2526.106-0ubuntu0.14.04.1.1107]] |
| precise | ignored | |
| trusty | released | 47.0.2526.106-0ubuntu0.14.04.1.1107 |
| trusty/esm | DNE | trusty was released [47.0.2526.106-0ubuntu0.14.04.1.1107] |
| upstream | released | 47.0.2526.80 |
| vivid | released | 47.0.2526.106-0ubuntu0.15.04.1.1192 |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| wily | released | 47.0.2526.106-0ubuntu0.15.10.1.1218 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1.11.4-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1.11.4-0ubuntu0.14.04.1]] |
| precise | DNE | |
| trusty | released | 1.11.4-0ubuntu0.14.04.1 |
| trusty/esm | DNE | trusty was released [1.11.4-0ubuntu0.14.04.1] |
| upstream | released | 1.11.4 |
| vivid | released | 1.11.4-0ubuntu0.15.04.1 |
| vivid/stable-phone-overlay | released | 1.12.5-0ubuntu0.15.04.1~overlay1 |
| vivid/ubuntu-core | DNE | |
| wily | released | 1.11.4-0ubuntu0.15.10.1 |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.
The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.
The WebPageSerializerImpl::openTagToString function in WebKit/Source/w ...
The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.
Уязвимость браузера Google Chrome, позволяющая нарушителю внедрить произвольный Веб- или HTML-код
EPSS
4.3 Medium
CVSS2