← Back to CVEs
CVE-2017-5033
MEDIUM4.3
Description
Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android failed to correctly propagate CSP restrictions to local scheme pages, which allowed a remote attacker to bypass content security policy via a crafted HTML page, related to the unsafe-inline keyword.
CVE Details
CVSS v3.1 Score4.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published4/24/2017
Last Modified4/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
apple:macosdebian:debian_linuxgoogle:androidgoogle:chromelinux:linux_kernelmicrosoft:windowsredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstation
Weaknesses (CWE)
CWE-281
References
http://rhn.redhat.com/errata/RHSA-2017-0499.html(chrome-cve-admin@google.com)
http://www.debian.org/security/2017/dsa-3810(chrome-cve-admin@google.com)
http://www.securityfocus.com/bid/96767(chrome-cve-admin@google.com)
https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html(chrome-cve-admin@google.com)
https://crbug.com/669086(chrome-cve-admin@google.com)
https://security.gentoo.org/glsa/201704-02(chrome-cve-admin@google.com)
https://twitter.com/Ma7h1as/status/907641276434063361(chrome-cve-admin@google.com)
http://rhn.redhat.com/errata/RHSA-2017-0499.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2017/dsa-3810(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/96767(af854a3a-2127-422b-91ae-364da2661108)
https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html(af854a3a-2127-422b-91ae-364da2661108)
https://crbug.com/669086(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201704-02(af854a3a-2127-422b-91ae-364da2661108)
https://twitter.com/Ma7h1as/status/907641276434063361(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.