Cross-site Scripting (XSS) Affecting chromium-browser package, versions <0:54.0.2840.59-1.el6


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.32% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL6-CHROMIUMBROWSER-1507488
  • published26 Jul 2021
  • disclosed12 Oct 2016

Introduced: 12 Oct 2016

CVE-2016-5191  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade RHEL:6 chromium-browser to version 0:54.0.2840.59-1.el6 or higher.
This issue was patched in RHSA-2016:2067.

NVD Description

Note: Versions mentioned in the description apply only to the upstream chromium-browser package and not the chromium-browser package as distributed by RHEL. See How to fix? for RHEL:6 relevant fixed versions and status.

Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo and scheme in an http://javascript:payload@example.com URL.