Vulnerability Details : CVE-2015-6755
Potential exploit
The ContainerNode::parserInsertBefore function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 46.0.2490.71, proceeds with a DOM tree insertion in certain cases where a parent node no longer contains a child node, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
Products affected by CVE-2015-6755
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6755
0.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6755
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-6755
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6755
-
http://www.securityfocus.com/bid/77071
Google Chrome 46.0.2490.71 Multiple Security Vulnerabilities
-
https://src.chromium.org/viewvc/blink?revision=200690&view=revision
[blink] Revision 200690
-
https://code.google.com/p/chromium/issues/detail?id=519558
519558 - Security: Universal XSS via ContainerNode::parserInsertBefore - chromium - Monorail
-
https://security.gentoo.org/glsa/201603-09
Chromium: Multiple vulnerabilities (GLSA 201603-09) — Gentoo security
-
http://www.ubuntu.com/usn/USN-2770-2
USN-2770-2: Oxide vulnerabilities | Ubuntu security notices
-
http://www.debian.org/security/2015/dsa-3376
Debian -- Security Information -- DSA-3376-1 chromium-browser
-
http://www.securitytracker.com/id/1033816
Google Chrome Multiple Bugs Let Remote Users Execute Arbitrary Code, Bypass Security Restrictions, and Obtain Potentially Sensitive Information - SecurityTracker
-
http://www.ubuntu.com/usn/USN-2770-1
USN-2770-1: Oxide vulnerabilities | Ubuntu security notices
-
http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html
Chrome Releases: Stable Channel Update
-
http://rhn.redhat.com/errata/RHSA-2015-1912.html
RHSA-2015:1912 - Security Advisory - Red Hat Customer Portal
Jump to