{ "id": "CVE-2009-2352", "sourceIdentifier": "cve@mitre.org", "published": "2009-07-07T23:30:00.280", "lastModified": "2024-11-21T01:04:40.230", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Google Chrome 1.0.154.48 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312. NOTE: it was later reported that 2.0.172.28, 2.0.172.37, and 3.0.193.2 Beta are also affected." }, { "lang": "es", "value": "Chrome de Google versiones 1.0.154.48 y anteriores, no bloquea los URI javascript: en encabezados Refresh en respuestas HTTP, que permite a los atacantes remotos conducir ataques de tipo cross-site scripting (XSS) por medio de vectores relacionados con (1) inyectar un encabezado Refresh o ( 2) especificar el contenido de un encabezado Refresh, este es un problema relacionado con el CVE-2009-1312. NOTA: m\u00e1s tarde se report\u00f3 que las versiones 2.0.172.28, 2.0.172.37 y 3.0.193.2 Beta tambi\u00e9n est\u00e1n afectadas." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.0.154.48", "matchCriteriaId": "4E9FA397-22DD-448C-8CC5-93549EAD7738" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*", "matchCriteriaId": "5B8FF77A-7802-4963-B532-3F16C7BB012C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*", "matchCriteriaId": "D73576CF-76EE-42A3-9955-D7991384B8C1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD4A2AB1-6F90-4D0B-A673-C6310514CE63" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "66A4FEB5-11D8-4FFC-972D-A3B991176040" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6313614-FC3C-488C-B80B-191797319A56" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*", "matchCriteriaId": "9CDF3DAB-73C4-48E8-9B0B-DADABF217555" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*", "matchCriteriaId": "7B2FAE50-4CA3-46F6-B533-C599011A9ED5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*", "matchCriteriaId": "B0D94F22-37B6-4938-966A-E1830D83FBC3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*", "matchCriteriaId": "D8B7164E-7A4F-4959-9E6D-EF614EDD4C3C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*", "matchCriteriaId": "0C0F9D75-B10D-468F-84D8-61B6A1230556" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*", "matchCriteriaId": "5D2CAE29-3F1E-4374-B82C-B60B7BB4AEAE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*", "matchCriteriaId": "173D539E-045E-4429-80C9-5749BECC6CD5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*", "matchCriteriaId": "D2052352-FECC-4990-B0F4-A715694AD816" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*", "matchCriteriaId": "BCBC80CB-4AB8-4EDF-9940-D2D7124D7549" }, { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*", "matchCriteriaId": "E37938BB-8368-46D6-A8E4-F99F5CB9B82E" } ] } ] } ], "references": [ { "url": "http://websecurity.com.ua/3275/", "source": "cve@mitre.org" }, { "url": "http://websecurity.com.ua/3386/", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/504718/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/504723/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/35572", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://websecurity.com.ua/3275/", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://websecurity.com.ua/3386/", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/504718/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/504723/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/35572", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] } ] }