Improper Authentication in Google Chrome - CVE-2013-0910
Published: March 5, 2013 / Updated: August 11, 2020
Google Chrome
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 25.0.1364.152 does not properly manage the interaction between the browser process and renderer processes during authorization of the loading of a plug-in, which makes it easier for remote attackers to bypass intended access restrictions via vectors involving a blocked plug-in.
How to mitigate CVE-2013-0910
Sources
- http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_4.html
- https://code.google.com/p/chromium/issues/detail?id=172573
- https://codereview.chromium.org/12086077
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16574
- https://src.chromium.org/viewvc/chrome?view=rev&revision=180103