Vulnerability Details : CVE-2014-1726
The drag implementation in Google Chrome before 34.0.1847.116 allows user-assisted remote attackers to bypass the Same Origin Policy and forge local pathnames by leveraging renderer access.
Products affected by CVE-2014-1726
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1726
0.72%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1726
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
References for CVE-2014-1726
-
http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html
Chrome Releases: Stable Channel UpdateVendor Advisory
-
https://code.google.com/p/chromium/issues/detail?id=346135
346135 - Security: html files from file URLs can read data from other file URLs via drag-and-drop - chromium - Monorail
-
http://security.gentoo.org/glsa/glsa-201408-16.xml
Chromium: Multiple vulnerabilities (GLSA 201408-16) — Gentoo security
-
http://lists.opensuse.org/opensuse-updates/2014-05/msg00012.html
openSUSE-SU-2014:0601-1: moderate: update for chromium
-
https://src.chromium.org/viewvc/chrome?revision=259353&view=revision
[chrome] Revision 259353
-
http://www.debian.org/security/2014/dsa-2905
Debian -- Security Information -- DSA-2905-1 chromium-browser
Jump to