CVE-2016-1697

The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html - () http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html -
References () http://www.debian.org/security/2016/dsa-3594 - () http://www.debian.org/security/2016/dsa-3594 -
References () http://www.securitytracker.com/id/1036026 - () http://www.securitytracker.com/id/1036026 -
References () http://www.ubuntu.com/usn/USN-2992-1 - () http://www.ubuntu.com/usn/USN-2992-1 -
References () https://access.redhat.com/errata/RHSA-2016:1201 - () https://access.redhat.com/errata/RHSA-2016:1201 -
References () https://codereview.chromium.org/2021373003 - () https://codereview.chromium.org/2021373003 -
References () https://crbug.com/613266 - () https://crbug.com/613266 -

07 Nov 2023, 02:30

Type Values Removed Values Added
References (CONFIRM) https://crbug.com/613266 - Permissions Required () https://crbug.com/613266 -
References (REDHAT) https://access.redhat.com/errata/RHSA-2016:1201 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2016:1201 -
References (CONFIRM) https://codereview.chromium.org/2021373003 - Issue Tracking () https://codereview.chromium.org/2021373003 -
References (SECTRACK) http://www.securitytracker.com/id/1036026 - Third Party Advisory () http://www.securitytracker.com/id/1036026 -
References (CONFIRM) http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html -
References (UBUNTU) http://www.ubuntu.com/usn/USN-2992-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2992-1 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html -
References (DEBIAN) http://www.debian.org/security/2016/dsa-3594 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3594 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html -

Information

Published : 2016-06-05 23:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-1697

Mitre link : CVE-2016-1697

CVE.ORG link : CVE-2016-1697


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • leap
  • opensuse

suse

  • linux_enterprise

canonical

  • ubuntu_linux

google

  • chrome

redhat

  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_server
CWE
CWE-284

Improper Access Control