159 lines
4.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2015-1244",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2015-04-19T10:59:07.757",
"lastModified": "2017-01-03T02:59:46.207",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in Google Chrome before 42.0.2311.90 does not replace the ws scheme with the wss scheme whenever an HSTS Policy is active, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for WebSocket traffic."
},
{
"lang": "es",
"value": "La funci\u00f3n URLRequest::GetHSTSRedirect en url_request/url_request.cc en Google Chrome anterior a 42.0.2311.90 no remplaza el esquema wss cuando una pol\u00edtica HSTS est\u00e1 activada, lo que facilita a atacantes remotos obtener informaci\u00f3n sensible mediante la captura de trafico WebSocket de la red."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndIncluding": "42.0.2311.60",
"matchCriteriaId": "6E0156CA-6A9D-4E00-AF48-14636FA05772"
}
]
}
]
}
],
"references": [
{
"url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
"source": "cve-coordination@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html",
"source": "cve-coordination@google.com"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html",
"source": "cve-coordination@google.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html",
"source": "cve-coordination@google.com"
},
{
"url": "http://ubuntu.com/usn/usn-2570-1",
"source": "cve-coordination@google.com"
},
{
"url": "http://www.debian.org/security/2015/dsa-3238",
"source": "cve-coordination@google.com"
},
{
"url": "http://www.securitytracker.com/id/1032209",
"source": "cve-coordination@google.com"
},
{
"url": "https://chromium.googlesource.com/chromium/src/net/+/2359906c4fdfa9d44b045755d23fe5327c10e010",
"source": "cve-coordination@google.com"
},
{
"url": "https://code.google.com/p/chromium/issues/detail?id=455215",
"source": "cve-coordination@google.com"
},
{
"url": "https://security.gentoo.org/glsa/201506-04",
"source": "cve-coordination@google.com"
}
]
}