core/dom/Document.cpp in Blink, as used in Google Chrome before 43.0.2357.65, enables the inheritance of the designMode attribute, which allows remote attackers to bypass the Same Origin Policy by leveraging the availability of editing.
References
Configurations
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html - | |
References | () http://www.debian.org/security/2015/dsa-3267 - | |
References | () http://www.securityfocus.com/bid/74723 - | |
References | () http://www.securitytracker.com/id/1032375 - | |
References | () https://code.google.com/p/chromium/issues/detail?id=444927 - | |
References | () https://security.gentoo.org/glsa/201506-04 - | |
References | () https://src.chromium.org/viewvc/blink?revision=192658&view=revision - |
07 Nov 2023, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html - | |
References | () https://code.google.com/p/chromium/issues/detail?id=444927 - | |
References | () http://www.securityfocus.com/bid/74723 - | |
References | () https://src.chromium.org/viewvc/blink?revision=192658&view=revision - | |
References | () https://security.gentoo.org/glsa/201506-04 - | |
References | () http://www.debian.org/security/2015/dsa-3267 - | |
References | () http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html - | |
References | () http://www.securitytracker.com/id/1032375 - | |
References | () http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html - |
Information
Published : 2015-05-20 10:59
Updated : 2024-11-21 02:24
NVD link : CVE-2015-1254
Mitre link : CVE-2015-1254
CVE.ORG link : CVE-2015-1254
JSON object : View
Products Affected
- chrome
debian
- debian_linux
CWE
CWE-264
Permissions, Privileges, and Access Controls