CVE-2015-1253

core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, related to the insert and executeReparentTask functions.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
References () http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html - () http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html -
References () http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html - () http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html -
References () http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html - () http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html -
References () http://www.debian.org/security/2015/dsa-3267 - () http://www.debian.org/security/2015/dsa-3267 -
References () http://www.securityfocus.com/bid/74723 - () http://www.securityfocus.com/bid/74723 -
References () http://www.securitytracker.com/id/1032375 - () http://www.securitytracker.com/id/1032375 -
References () https://code.google.com/p/chromium/issues/detail?id=464552 - () https://code.google.com/p/chromium/issues/detail?id=464552 -
References () https://security.gentoo.org/glsa/201506-04 - () https://security.gentoo.org/glsa/201506-04 -
References () https://src.chromium.org/viewvc/blink?revision=191807&view=revision - () https://src.chromium.org/viewvc/blink?revision=191807&view=revision -

07 Nov 2023, 02:24

Type Values Removed Values Added
References (CONFIRM) https://src.chromium.org/viewvc/blink?revision=191807&view=revision - () https://src.chromium.org/viewvc/blink?revision=191807&view=revision -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html - () http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html -
References (BID) http://www.securityfocus.com/bid/74723 - () http://www.securityfocus.com/bid/74723 -
References (GENTOO) https://security.gentoo.org/glsa/201506-04 - () https://security.gentoo.org/glsa/201506-04 -
References (DEBIAN) http://www.debian.org/security/2015/dsa-3267 - () http://www.debian.org/security/2015/dsa-3267 -
References (CONFIRM) http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html - Patch, Vendor Advisory () http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html -
References (SECTRACK) http://www.securitytracker.com/id/1032375 - () http://www.securitytracker.com/id/1032375 -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html - () http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=464552 - () https://code.google.com/p/chromium/issues/detail?id=464552 -

Information

Published : 2015-05-20 10:59

Updated : 2024-11-21 02:24


NVD link : CVE-2015-1253

Mitre link : CVE-2015-1253

CVE.ORG link : CVE-2015-1253


JSON object : View

Products Affected

debian

  • debian_linux

google

  • chrome
CWE
CWE-284

Improper Access Control