Incorrect application of sandboxing in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted MHTML page.
References
Link | Resource |
---|---|
https://www.reddit.com/r/netsec/comments/7cus2h/chrome_61_uxss_exploit_cve20175124/ | Third Party Advisory |
https://github.com/Bo0oM/CVE-2017-5124 | Third Party Advisory |
https://crbug.com/762930 | Permissions Required |
https://chromium.googlesource.com/chromium/src/+/4558c2885e618557a674660aff57404d25537070 | Vendor Advisory |
https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html | Vendor Advisory |
https://www.debian.org/security/2017/dsa-4020 | Third Party Advisory |
https://security.gentoo.org/glsa/201710-24 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2017:2997 | Third Party Advisory |
http://www.securityfocus.com/bid/101482 | Third Party Advisory VDB Entry |
Information
Published : 2018-02-07 15:29
Updated : 2018-02-23 07:54
NVD link : CVE-2017-5124
Mitre link : CVE-2017-5124
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
debian
- debian_linux
- chrome