2024-12-08 03:06:42 +00:00

208 lines
7.6 KiB
JSON

{
"id": "CVE-2009-3011",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-08-31T16:30:06.860",
"lastModified": "2024-11-21T01:06:18.130",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Google Chrome 1.0.154.48 and earlier, 2.0.172.28, 2.0.172.37, and 3.0.193.2 Beta does not properly block data: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI or (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header. NOTE: the JavaScript executes outside of the context of the HTTP site."
},
{
"lang": "es",
"value": "Google Chrome v1.0.154.48 y anteriores, v2.0.172.28, v2.0.172.37 y v3.0.193.2 Beta, no bloquea adecuadamente los datos: URIs en cabeceras \"Refresh\" en respuestas HTTP, lo que permite a atacantes remotos llevar a cabo ataques de ejecuci\u00f3n de secuencias de comandos en sitios cruzados relacionado con (1) la inyecci\u00f3n de una cabecera \"Refresh\" que contienen secuencias JavaScript en una URI data:text/html o (2) introduciendo una URI data:text/html con secuencias JavaScript cuando se especifica el contenido de una cabecera \"Refresh\". NOTA: el JavaScript se ejecuta fuera del contexto del sitio HTTP."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.154.48",
"matchCriteriaId": "4E9FA397-22DD-448C-8CC5-93549EAD7738"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.2.149.27:*:*:*:*:*:*:*",
"matchCriteriaId": "D55D5075-D233-42D6-B1D6-77B7599650EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8FF77A-7802-4963-B532-3F16C7BB012C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*",
"matchCriteriaId": "D73576CF-76EE-42A3-9955-D7991384B8C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4A2AB1-6F90-4D0B-A673-C6310514CE63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*",
"matchCriteriaId": "66A4FEB5-11D8-4FFC-972D-A3B991176040"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6313614-FC3C-488C-B80B-191797319A56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9CDF3DAB-73C4-48E8-9B0B-DADABF217555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*",
"matchCriteriaId": "7B2FAE50-4CA3-46F6-B533-C599011A9ED5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D94F22-37B6-4938-966A-E1830D83FBC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B7164E-7A4F-4959-9E6D-EF614EDD4C3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*",
"matchCriteriaId": "0C0F9D75-B10D-468F-84D8-61B6A1230556"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2CAE29-3F1E-4374-B82C-B60B7BB4AEAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*",
"matchCriteriaId": "173D539E-045E-4429-80C9-5749BECC6CD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*",
"matchCriteriaId": "D2052352-FECC-4990-B0F4-A715694AD816"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*",
"matchCriteriaId": "BCBC80CB-4AB8-4EDF-9940-D2D7124D7549"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*",
"matchCriteriaId": "E37938BB-8368-46D6-A8E4-F99F5CB9B82E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:2.0.172.28:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A621B1-3186-4CE2-8BCC-916027CC74CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:2.0.172.37:*:*:*:*:*:*:*",
"matchCriteriaId": "6B9D6ED9-D5C5-4CA9-84EA-8007F48CF597"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:3.0.193.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "C2F85551-EDB5-4790-8095-EFFA7DEC7F98"
}
]
}
]
}
],
"references": [
{
"url": "http://websecurity.com.ua/3315/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://websecurity.com.ua/3386/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52998",
"source": "cve@mitre.org"
},
{
"url": "http://websecurity.com.ua/3315/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://websecurity.com.ua/3386/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52998",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}