Vulnerability Details : CVE-2016-1658
The Extensions subsystem in Google Chrome before 50.0.2661.75 incorrectly relies on GetOrigin method calls for origin comparisons, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted extension.
Vulnerability category: BypassGain privilegeInformation leak
Exploit prediction scoring system (EPSS) score for CVE-2016-1658
Probability of exploitation activity in the next 30 days: 0.52%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 74 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-1658
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST |
4.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
NIST |
CWE ids for CVE-2016-1658
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1658
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
[security-announce] openSUSE-SU-2016:1061-1: important: Security updateThird Party Advisory
-
https://security.gentoo.org/glsa/201605-02
Chromium: Multiple vulnerabilities (GLSA 201605-02) — Gentoo security
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
[security-announce] openSUSE-SU-2016:1135-1: important: Security update
-
http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
http://www.debian.org/security/2016/dsa-3549
Debian -- Security Information -- DSA-3549-1 chromium-browserThird Party Advisory
-
https://codereview.chromium.org/1658913002
Issue 1658913002: Make extensions use a correct same-origin check. - Code Review
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
[security-announce] openSUSE-SU-2016:1136-1: important: Security update
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
[security-announce] SUSE-SU-2016:1060-1: important: Security update forThird Party Advisory
-
https://crbug.com/573317
573317 - UX and Extensions API confusion when file: URLs have hostnames - chromium - Monorail
-
http://rhn.redhat.com/errata/RHSA-2016-0638.html
RHSA-2016:0638 - Security Advisory - Red Hat Customer Portal
Products affected by CVE-2016-1658
- cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*