CVE-2018-6103
chromium-browser: UI spoof in Permissions
Severity Score
6.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
A stagnant permission prompt in Prompts in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass permission policy via a crafted HTML page.
Un mensaje de permisos estancado en Prompts en Google Chrome, en versiones anteriores a la 66.0.3359.117, permitía que un atacante remoto omitiese las políticas de permisos mediante una página HTML manipulada.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2018-01-23 CVE Reserved
- 2018-04-24 CVE Published
- 2024-08-05 CVE Updated
- 2024-09-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/103917 | Vdb Entry | |
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html | X_refsource_confirm | |
https://crbug.com/816033 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:1195 | 2023-11-07 | |
https://security.gentoo.org/glsa/201804-22 | 2023-11-07 | |
https://www.debian.org/security/2018/dsa-4182 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2018-6103 | 2018-04-23 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1568781 | 2018-04-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Linux Desktop Search vendor "Redhat" for product "Linux Desktop" | 6.0 Search vendor "Redhat" for product "Linux Desktop" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Server Search vendor "Redhat" for product "Linux Server" | 6.0 Search vendor "Redhat" for product "Linux Server" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Workstation Search vendor "Redhat" for product "Linux Workstation" | 6.0 Search vendor "Redhat" for product "Linux Workstation" and version "6.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Google Search vendor "Google" | Chrome Search vendor "Google" for product "Chrome" | < 66.0.3359.117 Search vendor "Google" for product "Chrome" and version " < 66.0.3359.117" | - |
Affected
|