Blink, as used in Google Chrome before 52.0.2743.116, does not ensure that a taint property is preserved after a structure-clone operation on an ImageBitmap object derived from a cross-origin image, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
References
Configurations
History
07 Nov 2023, 02:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () http://www.securitytracker.com/id/1036547 - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1580.html - | |
References | () https://security.gentoo.org/glsa/201610-09 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html - | |
References | () https://codereview.chromium.org/2097393002 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html - | |
References | () https://codereview.chromium.org/2096313002 - | |
References | () https://codereview.chromium.org/2178513002 - | |
References | () https://crbug.com/623406 - | |
References | () http://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop.html - | |
References | () http://www.securityfocus.com/bid/92276 - |
Information
Published : 2016-08-07 19:59
Updated : 2024-02-28 15:21
NVD link : CVE-2016-5145
Mitre link : CVE-2016-5145
CVE.ORG link : CVE-2016-5145
JSON object : View
Products Affected
- chrome
CWE
CWE-254
7PK - Security Features