Inappropriate implementation in Extensions API in Google Chrome prior to 121.0.6167.85 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Low)
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html | |
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html | Release Notes Vendor Advisory |
https://crbug.com/1494490 | Permissions Required |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/ | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Chrome
Published: 2024-01-23T23:53:01.437Z
Updated: 2024-01-23T23:53:01.437Z
Reserved: 2024-01-23T00:47:26.806Z
Link: CVE-2024-0811
JSON object: View
NVD Information
Status : Modified
Published: 2024-01-24T00:15:08.117
Modified: 2024-02-19T17:15:08.233
Link: CVE-2024-0811
JSON object: View
Redhat Information
No data.
CWE