First published: Wed Jan 25 2017(Updated: )
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to properly enforce unsafe-inline content security policy, which allowed a remote attacker to bypass content security policy via a crafted HTML page.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <56.0.2924.76 | 56.0.2924.76 |
Google Chrome (Trace Event) | <=55.0.2883.87 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-5027 has a high severity rating due to its potential for allowing remote attackers to bypass content security policy.
To fix CVE-2017-5027, it is recommended to update Google Chrome to version 56.0.2924.76 or later.
CVE-2017-5027 affects Google Chrome versions prior to 56.0.2924.76 for desktop and versions before 56.0.2924.87 for Android.
CVE-2017-5027 facilitates remote attacks that allow attackers to execute scripts by bypassing the content security policy.
Yes, CVE-2017-5027 is related to the improper enforcement of content security policy which can lead to cross-site scripting attacks.