Inappropriate implementation in Autofill in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to spoof security UI via a crafted HTML page.
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html | Release Notes Vendor Advisory |
https://crbug.com/1172533 | Issue Tracking Permissions Required Vendor Advisory |
https://www.debian.org/security/2021/dsa-4906 | Third Party Advisory |
https://security.gentoo.org/glsa/202104-08 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/ | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-04-26 10:15
Updated : 2021-06-01 10:46
NVD link : CVE-2021-21215
Mitre link : CVE-2021-21215
JSON object : View
CWE
CWE-290
Authentication Bypass by Spoofing
Products Affected
debian
- debian_linux
- chrome
fedoraproject
- fedora