FKIE_CVE-2009-3263

Vulnerability from fkie_nvd - Published: 2009-09-18 22:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Google Chrome 2.x and 3.x before 3.0.195.21 allows remote attackers to inject arbitrary web script or HTML via a (1) RSS or (2) Atom feed, related to the rendering of the application/rss+xml content type as XML "active content."
Impacted products
Vendor Product Version
google chrome 2.0.156.1
google chrome 2.0.157.0
google chrome 2.0.157.2
google chrome 2.0.158.0
google chrome 2.0.159.0
google chrome 2.0.169.0
google chrome 2.0.169.1
google chrome 2.0.170.0
google chrome 2.0.172
google chrome 2.0.172.2
google chrome 2.0.172.8
google chrome 2.0.172.27
google chrome 2.0.172.28
google chrome 2.0.172.30
google chrome 2.0.172.31
google chrome 2.0.172.33
google chrome 2.0.172.37
google chrome 2.0.172.38
google chrome 3.0.182.2
google chrome 3.0.190.2
google chrome 3.0.193.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.156.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F95770-F36F-43C0-986F-5C819648271E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.157.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECCE1FD3-8D27-4304-97F9-6F9689F2498D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.157.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6CA696-49AA-4445-B978-96C1D8CE58DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.158.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9CFA3BF-6C07-448B-8C83-AD4C524A6577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.159.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8497F93-D88A-4FFA-B988-7210608530A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.169.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "49FB50A3-FFDA-4BB9-A2C1-DA6DACC2DAAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.169.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "59F93BC8-FE87-4CEC-B28A-4B0B5A468EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.170.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D459C7-2555-42FA-9C68-619E410D7CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5CDF938-2998-403F-B343-29B620E05D44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F89EA6-B411-4887-90A1-FF3A054424F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D2BA3B-1C69-470C-9C40-001FAE82DDB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "3583995C-CD74-401F-905D-65B73CFC4595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0A621B1-3186-4CE2-8BCC-916027CC74CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A9B50D-5B0F-41C9-8FAF-B78CD21A0554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F5223F1-85CD-4DF9-9665-BDF7B554A784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DD7AFBA-A9A2-4EE9-B652-78D25EFBB690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9D6ED9-D5C5-4CA9-84EA-8007F48CF597",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:2.0.172.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7F7897-ECD1-499E-81CD-E224241B6607",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:3.0.182.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7422307-271F-4953-9CA4-C50238D27BAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:3.0.190.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DCC3490-5B06-4992-8E31-CA46E18607B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:google:chrome:3.0.193.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "C2F85551-EDB5-4790-8095-EFFA7DEC7F98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Google Chrome 2.x and 3.x before 3.0.195.21 allows remote attackers to inject arbitrary web script or HTML via a (1) RSS or (2) Atom feed, related to the rendering of the application/rss+xml content type as XML \"active content.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Google Chrome 2.x y 3.x anteriores a 3.0.195.21 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de feeds (1) RSS o (2) Atom, relacionado con el renderizado de un contenido del tipo application/rss+xml como \"contenido activo\" XML."
    }
  ],
  "evaluatorSolution": "Per http://www.securityfocus.com/archive/1/archive/1/506517/100/0/threaded\r\n\r\n\r\nVII. SOLUTION\r\n-------------------------\r\nChrome: Upgrade to latest version of Google Chrome (v3.0.195.21 or higher).\r\nIf you remain connected to the internet, this should be automatic.\r\nOpera: Wait for upcoming patch for Scenario (3) in next minor release\r\n(non-alpha/beta) of Opera 10 [Opera 9 users need to upgrade]. However, you\r\nwill still continue to be vulnerable to script execution.",
  "id": "CVE-2009-3263",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-09-18T22:30:00.563",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://code.google.com/p/chromium/issues/detail?id=21238"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2009/09/stable-channel-update.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36770"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/506517/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/36416"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/chromium/issues/detail?id=21238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://googlechromereleases.blogspot.com/2009/09/stable-channel-update.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/506517/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/36416"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…