Vulnerability Details : CVE-2015-6786
The CSPSourceList::matches function in WebKit/Source/core/frame/csp/CSPSourceList.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts a blob:, data:, or filesystem: URL as a match for a * pattern, which allows remote attackers to bypass intended scheme restrictions in opportunistic circumstances by leveraging a policy that relies on this pattern.
Products affected by CVE-2015-6786
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6786
0.90%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6786
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2015-6786
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6786
-
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
[security-announce] openSUSE-SU-2015:2291-1: important: Security update
-
http://www.securityfocus.com/bid/78416
Google Chrome Prior to 47.0.2526.73 Multiple Security Vulnerabilities
-
https://codereview.chromium.org/1361763005/
Issue 1361763005: Disallow CSP source * matching of data:, blob:, and filesystem: URLs - Code Review
-
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
[security-announce] openSUSE-SU-2015:2290-1: important: Security update
-
http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html
Chrome Releases: Stable Channel Update
-
http://www.ubuntu.com/usn/USN-2825-1
USN-2825-1: Oxide vulnerabilities | Ubuntu security notices
-
https://security.gentoo.org/glsa/201603-09
Chromium: Multiple vulnerabilities (GLSA 201603-09) — Gentoo security
-
http://www.securitytracker.com/id/1034298
Google Chrome Multiple Bugs Let Remote Users Execute Arbitrary Code, Bypass Security Restrictions, and Spoof Content - SecurityTracker
-
http://www.debian.org/security/2015/dsa-3415
Debian -- Security Information -- DSA-3415-1 chromium-browser
-
https://code.google.com/p/chromium/issues/detail?id=534570
534570 - CSP: wildcard source expression (*) should not match data URIs - chromium - Monorail
Jump to