Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-5110 : What You Need to Know

Learn about CVE-2017-5110 affecting Google Chrome prior to version 60.0.3112.78 for Mac, Windows, Linux, and Android. Find out the impact, affected systems, and mitigation steps.

Google Chrome prior to version 60.0.3112.78 for Mac, Windows, Linux, and Android had a vulnerability in the web payments API that could allow a remote attacker to manipulate the Omnibox contents.

Understanding CVE-2017-5110

Prior to version 60.0.3112.78, an improper utilization of the web payments API on blob: and data: schemes within Web Payments in Google Chrome for Mac, Windows, Linux, and Android resulted in a potential security threat. This flaw enabled a remote attacker to manipulate the contents of the Omnibox by creating a specifically crafted HTML page.

What is CVE-2017-5110?

Inappropriate implementation of the web payments API on blob: and data: schemes in Web Payments in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page.

The Impact of CVE-2017-5110

        The vulnerability could be exploited by a remote attacker to manipulate the Omnibox contents.

Technical Details of CVE-2017-5110

Google Chrome prior to version 60.0.3112.78 for Mac, Windows, Linux, and Android was affected by this vulnerability.

Vulnerability Description

        Improper utilization of the web payments API on blob: and data: schemes within Web Payments in Google Chrome.

Affected Systems and Versions

        Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android.

Exploitation Mechanism

        A remote attacker could manipulate the contents of the Omnibox by creating a specifically crafted HTML page.

Mitigation and Prevention

It is crucial to take immediate steps to address and prevent the exploitation of this vulnerability.

Immediate Steps to Take

        Update Google Chrome to version 60.0.3112.78 or later to mitigate the vulnerability.
        Avoid clicking on suspicious links or visiting untrusted websites.

Long-Term Security Practices

        Regularly update software and applications to the latest versions.
        Implement secure browsing practices and be cautious of potentially harmful websites.

Patching and Updates

        Stay informed about security updates and patches released by Google Chrome.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now