First published: Wed Oct 10 2018(Updated: )
Insufficient policy enforcement in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.
Credit: Jun Kokatsu @shhnjk cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <73.0.3683.75 | 73.0.3683.75 |
Google Chrome | <73.0.3683.75 | 73.0.3683.75 |
Google Chrome | <73.0.3683.75 | |
SUSE Backports | =sle-15 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
openSUSE | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-5800 has a high severity rating due to its ability to bypass content security policies.
To fix CVE-2019-5800, you need to update your Google Chrome or Chromium browser to version 73.0.3683.75 or later.
CVE-2019-5800 affects Google Chrome versions prior to 73.0.3683.75 and Chromium browsers on various platforms like Red Hat and openSUSE.
Yes, CVE-2019-5800 allows remote attackers to bypass content security policies by using a crafted HTML page.
A content security policy is a security feature that helps prevent a variety of attacks by restricting how resources can be loaded by a web page.