7.8

CVE-2009-1412

Exploit

Argument injection vulnerability in the chromehtml: protocol handler in Google Chrome before 1.0.154.59, when invoked by Internet Explorer, allows remote attackers to determine the existence of files, and open tabs for URLs that do not satisfy the IsWebSafeScheme restriction, via a web page that sets document.location to a chromehtml: value, as demonstrated by use of a (1) javascript: or (2) data: URL.  NOTE: this can be leveraged for Universal XSS by exploiting certain behavior involving persistence across page transitions.

Data is provided by the National Vulnerability Database (NVD)
GoogleChrome Version <= 1.0.154.53
   MicrosoftInternet Explorer Version7
GoogleChrome Version0.2.149.29
   MicrosoftInternet Explorer Version7
GoogleChrome Version0.2.149.30
   MicrosoftInternet Explorer Version7
GoogleChrome Version0.2.152.1
   MicrosoftInternet Explorer Version7
GoogleChrome Version0.2.153.1
   MicrosoftInternet Explorer Version7
GoogleChrome Version0.3.154.0
   MicrosoftInternet Explorer Version7
GoogleChrome Version0.3.154.3
   MicrosoftInternet Explorer Version7
GoogleChrome Version0.4.154.18
   MicrosoftInternet Explorer Version7
GoogleChrome Version0.4.154.22
   MicrosoftInternet Explorer Version7
GoogleChrome Version0.4.154.31
   MicrosoftInternet Explorer Version7
GoogleChrome Version0.4.154.33
   MicrosoftInternet Explorer Version7
GoogleChrome Version1.0.154.36
   MicrosoftInternet Explorer Version7
GoogleChrome Version1.0.154.39
   MicrosoftInternet Explorer Version7
GoogleChrome Version1.0.154.42
   MicrosoftInternet Explorer Version7
GoogleChrome Version1.0.154.43
   MicrosoftInternet Explorer Version7
GoogleChrome Version1.0.154.46
   MicrosoftInternet Explorer Version7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.29% 0.492
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:C/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.