Argument injection vulnerability in the chromehtml: protocol handler in Google Chrome prior to 1.0.154.59, when invoked by Internet Explorer, allows remote malicious users to determine the existence of files, and open tabs for URLs that do not satisfy the IsWebSafeScheme restriction, via a web page that sets document.location to a chromehtml: value, as demonstrated by use of a (1) javascript: or (2) data: URL. NOTE: this can be leveraged for Universal XSS by exploiting certain behavior involving persistence across page transitions.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
google chrome |
||
google chrome 0.2.149.29 |
||
google chrome 0.2.149.30 |
||
google chrome 0.2.152.1 |
||
google chrome 0.2.153.1 |
||
google chrome 0.3.154.0 |
||
google chrome 0.3.154.3 |
||
google chrome 0.4.154.18 |
||
google chrome 0.4.154.22 |
||
google chrome 0.4.154.31 |
||
google chrome 0.4.154.33 |
||
google chrome 1.0.154.36 |
||
google chrome 1.0.154.39 |
||
google chrome 1.0.154.42 |
||
google chrome 1.0.154.43 |
||
google chrome 1.0.154.46 |