First published: Wed Jul 22 2020(Updated: )
Insufficient policy enforcement in autofill in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Credit: chrome-cve-admin@google.com Nadja Ungethuem www
Affected Software | Affected Version | How to fix |
---|---|---|
debian/chromium | 90.0.4430.212-1~deb10u1 116.0.5845.180-1~deb11u1 120.0.6099.129-1~deb11u1 119.0.6045.199-1~deb12u1 120.0.6099.129-1~deb12u1 120.0.6099.129-1 | |
Google Chrome | <85.0.4183.83 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Backports SLE | =15.0-sp2 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =33 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Google Chrome | <85.0.4183.83 | 85.0.4183.83 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2020-6560.
Google Chrome prior to version 85.0.4183.83, openSUSE Backports SLE 15.0-sp1 and 15.0-sp2, Debian Linux 10.0, Fedoraproject Fedora 33, openSUSE Leap 15.1 and 15.2, and chromium package in Debian.
The severity of CVE-2020-6560 is medium with a CVSS score of 6.5.
A remote attacker can exploit this vulnerability by crafting a malicious HTML page to leak cross-origin data.
To fix CVE-2020-6560, update Google Chrome to version 85.0.4183.83 or later, update openSUSE Backports SLE, Debian Linux, Fedoraproject Fedora, and openSUSE Leap to the appropriate patched versions, and update the chromium package in Debian.