Lucene search

K
cveChromeCVE-2014-3160
HistoryJul 20, 2014 - 11:12 a.m.

CVE-2014-3160

2014-07-2011:12:50
CWE-264
Chrome
web.nvd.nist.gov
56
cve-2014-3160
resourcefetcher
canrequest
blink
google chrome
same origin policy
svg
nvd

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

5.9

Confidence

Low

EPSS

0.014

Percentile

86.2%

The ResourceFetcher::canRequest function in core/fetch/ResourceFetcher.cpp in Blink, as used in Google Chrome before 36.0.1985.125, does not properly restrict subresource requests associated with SVG files, which allows remote attackers to bypass the Same Origin Policy via a crafted file.

Affected configurations

Nvd
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
Node
googlechromeMatch36.0.1985.1
OR
googlechromeMatch36.0.1985.2
OR
googlechromeMatch36.0.1985.3
OR
googlechromeMatch36.0.1985.4
OR
googlechromeMatch36.0.1985.5
OR
googlechromeMatch36.0.1985.6
OR
googlechromeMatch36.0.1985.8
OR
googlechromeMatch36.0.1985.12
OR
googlechromeMatch36.0.1985.13
OR
googlechromeMatch36.0.1985.14
OR
googlechromeMatch36.0.1985.15
OR
googlechromeMatch36.0.1985.16
OR
googlechromeMatch36.0.1985.17
OR
googlechromeMatch36.0.1985.18
OR
googlechromeMatch36.0.1985.19
OR
googlechromeMatch36.0.1985.20
OR
googlechromeMatch36.0.1985.21
OR
googlechromeMatch36.0.1985.22
OR
googlechromeMatch36.0.1985.23
OR
googlechromeMatch36.0.1985.24
OR
googlechromeMatch36.0.1985.25
OR
googlechromeMatch36.0.1985.26
OR
googlechromeMatch36.0.1985.27
OR
googlechromeMatch36.0.1985.28
OR
googlechromeMatch36.0.1985.29
OR
googlechromeMatch36.0.1985.30
OR
googlechromeMatch36.0.1985.31
OR
googlechromeMatch36.0.1985.32
OR
googlechromeMatch36.0.1985.33
OR
googlechromeMatch36.0.1985.34
OR
googlechromeMatch36.0.1985.35
OR
googlechromeMatch36.0.1985.36
OR
googlechromeMatch36.0.1985.37
OR
googlechromeMatch36.0.1985.38
OR
googlechromeMatch36.0.1985.39
OR
googlechromeMatch36.0.1985.40
OR
googlechromeMatch36.0.1985.41
OR
googlechromeMatch36.0.1985.42
OR
googlechromeMatch36.0.1985.43
OR
googlechromeMatch36.0.1985.44
OR
googlechromeMatch36.0.1985.45
OR
googlechromeMatch36.0.1985.46
OR
googlechromeMatch36.0.1985.47
OR
googlechromeMatch36.0.1985.48
OR
googlechromeMatch36.0.1985.49
OR
googlechromeMatch36.0.1985.50
OR
googlechromeMatch36.0.1985.51
OR
googlechromeMatch36.0.1985.52
OR
googlechromeMatch36.0.1985.53
OR
googlechromeMatch36.0.1985.54
OR
googlechromeMatch36.0.1985.55
OR
googlechromeMatch36.0.1985.56
OR
googlechromeMatch36.0.1985.57
OR
googlechromeMatch36.0.1985.58
OR
googlechromeMatch36.0.1985.59
OR
googlechromeMatch36.0.1985.60
OR
googlechromeMatch36.0.1985.61
OR
googlechromeMatch36.0.1985.62
OR
googlechromeMatch36.0.1985.63
OR
googlechromeMatch36.0.1985.64
OR
googlechromeMatch36.0.1985.65
OR
googlechromeMatch36.0.1985.66
OR
googlechromeMatch36.0.1985.67
OR
googlechromeMatch36.0.1985.68
OR
googlechromeMatch36.0.1985.69
OR
googlechromeMatch36.0.1985.70
OR
googlechromeMatch36.0.1985.72
OR
googlechromeMatch36.0.1985.73
OR
googlechromeMatch36.0.1985.74
OR
googlechromeMatch36.0.1985.75
OR
googlechromeMatch36.0.1985.76
OR
googlechromeMatch36.0.1985.77
OR
googlechromeMatch36.0.1985.78
OR
googlechromeMatch36.0.1985.79
OR
googlechromeMatch36.0.1985.81
OR
googlechromeMatch36.0.1985.82
OR
googlechromeMatch36.0.1985.83
OR
googlechromeMatch36.0.1985.84
OR
googlechromeMatch36.0.1985.85
OR
googlechromeMatch36.0.1985.86
OR
googlechromeMatch36.0.1985.87
OR
googlechromeMatch36.0.1985.88
OR
googlechromeMatch36.0.1985.89
OR
googlechromeMatch36.0.1985.90
OR
googlechromeMatch36.0.1985.91
OR
googlechromeMatch36.0.1985.92
OR
googlechromeMatch36.0.1985.93
OR
googlechromeMatch36.0.1985.94
OR
googlechromeMatch36.0.1985.95
OR
googlechromeMatch36.0.1985.96
OR
googlechromeMatch36.0.1985.97
OR
googlechromeMatch36.0.1985.98
OR
googlechromeMatch36.0.1985.99
OR
googlechromeMatch36.0.1985.100
OR
googlechromeMatch36.0.1985.101
OR
googlechromeMatch36.0.1985.102
OR
googlechromeMatch36.0.1985.103
OR
googlechromeMatch36.0.1985.104
OR
googlechromeMatch36.0.1985.105
OR
googlechromeMatch36.0.1985.106
OR
googlechromeMatch36.0.1985.122
OR
googlechromeMatch36.0.1985.123
OR
googlechromeMatch36.0.1985.124
VendorProductVersionCPE
debiandebian_linux7.0cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
debiandebian_linux8.0cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
googlechrome36.0.1985.1cpe:2.3:a:google:chrome:36.0.1985.1:*:*:*:*:*:*:*
googlechrome36.0.1985.2cpe:2.3:a:google:chrome:36.0.1985.2:*:*:*:*:*:*:*
googlechrome36.0.1985.3cpe:2.3:a:google:chrome:36.0.1985.3:*:*:*:*:*:*:*
googlechrome36.0.1985.4cpe:2.3:a:google:chrome:36.0.1985.4:*:*:*:*:*:*:*
googlechrome36.0.1985.5cpe:2.3:a:google:chrome:36.0.1985.5:*:*:*:*:*:*:*
googlechrome36.0.1985.6cpe:2.3:a:google:chrome:36.0.1985.6:*:*:*:*:*:*:*
googlechrome36.0.1985.8cpe:2.3:a:google:chrome:36.0.1985.8:*:*:*:*:*:*:*
googlechrome36.0.1985.12cpe:2.3:a:google:chrome:36.0.1985.12:*:*:*:*:*:*:*
Rows per page:
1-10 of 1051

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

5.9

Confidence

Low

EPSS

0.014

Percentile

86.2%