CVE-2015-1244
chromium-browser: HSTS bypass in WebSockets
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in Google Chrome before 42.0.2311.90 does not replace the ws scheme with the wss scheme whenever an HSTS Policy is active, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for WebSocket traffic.
La función URLRequest::GetHSTSRedirect en url_request/url_request.cc en Google Chrome anterior a 42.0.2311.90 no remplaza el esquema wss cuando una política HSTS está activada, lo que facilita a atacantes remotos obtener información sensible mediante la captura de trafico WebSocket de la red.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2015-01-21 CVE Reserved
- 2015-04-17 CVE Published
- 2024-08-06 CVE Updated
- 2024-11-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-305: Authentication Bypass by Primary Weakness
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html | X_refsource_confirm | |
http://www.securitytracker.com/id/1032209 | Vdb Entry | |
https://chromium.googlesource.com/chromium/src/net/+/2359906c4fdfa9d44b045755d23fe5327c10e010 | X_refsource_confirm | |
https://code.google.com/p/chromium/issues/detail?id=455215 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html | 2023-11-07 | |
http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2015-0816.html | 2023-11-07 | |
http://ubuntu.com/usn/usn-2570-1 | 2023-11-07 | |
http://www.debian.org/security/2015/dsa-3238 | 2023-11-07 | |
https://security.gentoo.org/glsa/201506-04 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2015-1244 | 2015-04-16 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1211926 | 2015-04-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 15.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "15.04" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | <= 42.0.2311.60 Search vendor "Google" for product "Chrome" and version " <= 42.0.2311.60" | - |
Affected
|