Chrome Universal XSS via the... CVE-2015-6769 CNNVD-201512-050

7.5 AV AC AU C I A
发布: 2015-12-06
修订: 2023-11-07

#### VULNERABILITY DETAILS From /WebKit/Source/core/loader/DocumentLoader.cpp: ``` PassRefPtrWillBeRawPtr<DocumentWriter> DocumentLoader::createWriterFor(const Document* ownerDocument, const DocumentInit& init, ...) { LocalFrame* frame = init.frame(); ASSERT(!frame->document() || !frame->document()->isActive()); ASSERT(frame->tree().childCount() == 0); if (!init.shouldReuseDefaultView()) frame->setDOMWindow(LocalDOMWindow::create(*frame)); RefPtrWillBeRawPtr<Document> document = frame->localDOMWindow()->installNewDocument(mimeType, init); (...) } ``` |frame->setDOMWindow| clears the window proxy, which disposes the V8 context, which notifies observers of WillReleaseScriptContext. Among the observers, there's |extension_dispatcher_|, which loads the "unload_event" module and triggers its |dispatch| method. This in turn can run user's code through getters/setters. Having arbitrary script at this execution point may lead to all sorts of broken/unexpected behavior, the example below...

0%
暂无可用Exp或PoC
当前有1条受影响产品信息