Vulnerability Description
Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo and scheme in an http://javascript:[email protected] URL.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | <= 53.0.2785.143 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2016-2067.html
- http://www.securityfocus.com/bid/93528
- https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.
- https://codereview.chromium.org/2411473002
- https://crbug.com/639126
- https://security.gentoo.org/glsa/201610-09
- http://rhn.redhat.com/errata/RHSA-2016-2067.html
- http://www.securityfocus.com/bid/93528
- https://chromereleases.googleblog.com/2016/10/stable-channel-update-for-desktop.
- https://codereview.chromium.org/2411473002
- https://crbug.com/639126
- https://security.gentoo.org/glsa/201610-09
FAQ
What is CVE-2016-5191?
CVE-2016-5191 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject a...
How severe is CVE-2016-5191?
CVE-2016-5191 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-5191?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome.