Inappropriate implementation in Extensions API in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Low)
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html | |
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html | Release Notes Vendor Advisory |
https://crbug.com/1494490 | Permissions Required |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/ | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-01-24 00:15
Updated : 2024-02-19 17:15
NVD link : CVE-2024-0811
Mitre link : CVE-2024-0811
CVE.ORG link : CVE-2024-0811
JSON object : View
Products Affected
fedoraproject
- fedora
- chrome
CWE