2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-2352" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-07-07T23:30:00.280" ,
2024-11-22 09:15:19 +00:00
"lastModified" : "2024-11-21T01:04:40.230" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Google Chrome 1.0.154.48 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312. NOTE: it was later reported that 2.0.172.28, 2.0.172.37, and 3.0.193.2 Beta are also affected."
} ,
{
"lang" : "es" ,
"value" : "Chrome de Google versiones 1.0.154.48 y anteriores, no bloquea los URI javascript: en encabezados Refresh en respuestas HTTP, que permite a los atacantes remotos conducir ataques de tipo cross-site scripting (XSS) por medio de vectores relacionados con (1) inyectar un encabezado Refresh o ( 2) especificar el contenido de un encabezado Refresh, este es un problema relacionado con el CVE-2009-1312. NOTA: m\u00e1s tarde se report\u00f3 que las versiones 2.0.172.28, 2.0.172.37 y 3.0.193.2 Beta tambi\u00e9n est\u00e1n afectadas."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N" ,
2024-11-22 09:15:19 +00:00
"baseScore" : 4.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 09:15:19 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.0.154.48" ,
"matchCriteriaId" : "4E9FA397-22DD-448C-8CC5-93549EAD7738"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B8FF77A-7802-4963-B532-3F16C7BB012C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D73576CF-76EE-42A3-9955-D7991384B8C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD4A2AB1-6F90-4D0B-A673-C6310514CE63"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "66A4FEB5-11D8-4FFC-972D-A3B991176040"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6313614-FC3C-488C-B80B-191797319A56"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9CDF3DAB-73C4-48E8-9B0B-DADABF217555"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7B2FAE50-4CA3-46F6-B533-C599011A9ED5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0D94F22-37B6-4938-966A-E1830D83FBC3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8B7164E-7A4F-4959-9E6D-EF614EDD4C3C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C0F9D75-B10D-468F-84D8-61B6A1230556"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D2CAE29-3F1E-4374-B82C-B60B7BB4AEAE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "173D539E-045E-4429-80C9-5749BECC6CD5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2052352-FECC-4990-B0F4-A715694AD816"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BCBC80CB-4AB8-4EDF-9940-D2D7124D7549"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E37938BB-8368-46D6-A8E4-F99F5CB9B82E"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://websecurity.com.ua/3275/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://websecurity.com.ua/3386/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/504718/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/504723/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/35572" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
2024-11-22 09:15:19 +00:00
} ,
{
"url" : "http://websecurity.com.ua/3275/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://websecurity.com.ua/3386/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/504718/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/504723/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/35572" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
2023-04-24 12:24:31 +02:00
}
]
}