FKIE_CVE-2009-2352

Vulnerability from fkie_nvd - Published: 2009-07-07 23:30 - Updated: 2026-04-23 00:35
Severity ?
Summary
Google Chrome 1.0.154.48 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312. NOTE: it was later reported that 2.0.172.28, 2.0.172.37, and 3.0.193.2 Beta are also affected.
Impacted products
Vendor Product Version
google chrome *
google chrome 0.2.149.29
google chrome 0.2.149.30
google chrome 0.2.152.1
google chrome 0.2.153.1
google chrome 0.3.154.0
google chrome 0.3.154.3
google chrome 0.4.154.18
google chrome 0.4.154.22
google chrome 0.4.154.31
google chrome 0.4.154.33
google chrome 1.0.154.36
google chrome 1.0.154.39
google chrome 1.0.154.42
google chrome 1.0.154.43
google chrome 1.0.154.46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E9FA397-22DD-448C-8CC5-93549EAD7738",
              "versionEndIncluding": "1.0.154.48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B8FF77A-7802-4963-B532-3F16C7BB012C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73576CF-76EE-42A3-9955-D7991384B8C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD4A2AB1-6F90-4D0B-A673-C6310514CE63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A4FEB5-11D8-4FFC-972D-A3B991176040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6313614-FC3C-488C-B80B-191797319A56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CDF3DAB-73C4-48E8-9B0B-DADABF217555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B2FAE50-4CA3-46F6-B533-C599011A9ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0D94F22-37B6-4938-966A-E1830D83FBC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B7164E-7A4F-4959-9E6D-EF614EDD4C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C0F9D75-B10D-468F-84D8-61B6A1230556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D2CAE29-3F1E-4374-B82C-B60B7BB4AEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "173D539E-045E-4429-80C9-5749BECC6CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2052352-FECC-4990-B0F4-A715694AD816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCBC80CB-4AB8-4EDF-9940-D2D7124D7549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37938BB-8368-46D6-A8E4-F99F5CB9B82E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Google Chrome 1.0.154.48 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312. NOTE: it was later reported that 2.0.172.28, 2.0.172.37, and 3.0.193.2 Beta are also affected."
    },
    {
      "lang": "es",
      "value": "Chrome de Google versiones 1.0.154.48 y anteriores, no bloquea los URI javascript: en encabezados Refresh en respuestas HTTP, que permite a los atacantes remotos conducir ataques de tipo cross-site scripting (XSS) por medio de vectores relacionados con (1) inyectar un encabezado Refresh o ( 2) especificar el contenido de un encabezado Refresh, este es un problema relacionado con el CVE-2009-1312. NOTA: m\u00e1s tarde se report\u00f3 que las versiones 2.0.172.28, 2.0.172.37 y 3.0.193.2 Beta tambi\u00e9n est\u00e1n afectadas."
    }
  ],
  "id": "CVE-2009-2352",
  "lastModified": "2026-04-23T00:35:47.467",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-07-07T23:30:00.280",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://websecurity.com.ua/3275/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://websecurity.com.ua/3386/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/504718/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/504723/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/35572"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://websecurity.com.ua/3275/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://websecurity.com.ua/3386/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/504718/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/504723/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/35572"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…