Google Chrome 1.0.154.48 and earlier, 2.0.172.28, 2.0.172.37, and 3.0.193.2 Beta does not properly block data: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI or (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header. NOTE: the JavaScript executes outside of the context of the HTTP site.
CPE | Name | Operator | Version |
---|---|---|---|
chrome | eq | 0.3.154.3 | |
chrome | eq | 0.2.149.30 | |
chrome | eq | 0.4.154.31 | |
chrome | eq | 1.0.154.39 | |
chrome | le | 1.0.154.48 | |
chrome | eq | 0.2.149.27 | |
chrome | eq | 0.4.154.33 | |
chrome | eq | 1.0.154.43 | |
chrome | eq | 1.0.154.42 | |
chrome | eq | 0.4.154.18 |