Vulnerabilities > CVE-2020-6519
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
HIGH Availability impact
NONE Summary
Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.
Vulnerable Configurations
References
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html
- http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html
- http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1064676
- https://crbug.com/1064676
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/
- https://security.gentoo.org/glsa/202007-08
- https://security.gentoo.org/glsa/202007-08
- https://www.debian.org/security/2021/dsa-4824
- https://www.debian.org/security/2021/dsa-4824