Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo and scheme in an http://javascript:payload@example.com URL.
{
"binaries": [
{
"binary_name": "chromium-browser",
"binary_version": "58.0.3029.81-0ubuntu0.14.04.1172"
},
{
"binary_name": "chromium-browser-l10n",
"binary_version": "58.0.3029.81-0ubuntu0.14.04.1172"
},
{
"binary_name": "chromium-chromedriver",
"binary_version": "58.0.3029.81-0ubuntu0.14.04.1172"
},
{
"binary_name": "chromium-codecs-ffmpeg",
"binary_version": "58.0.3029.81-0ubuntu0.14.04.1172"
},
{
"binary_name": "chromium-codecs-ffmpeg-extra",
"binary_version": "58.0.3029.81-0ubuntu0.14.04.1172"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "chromium-browser",
"binary_version": "55.0.2883.87-0ubuntu0.16.04.1263"
},
{
"binary_name": "chromium-browser-l10n",
"binary_version": "55.0.2883.87-0ubuntu0.16.04.1263"
},
{
"binary_name": "chromium-chromedriver",
"binary_version": "55.0.2883.87-0ubuntu0.16.04.1263"
},
{
"binary_name": "chromium-codecs-ffmpeg",
"binary_version": "55.0.2883.87-0ubuntu0.16.04.1263"
},
{
"binary_name": "chromium-codecs-ffmpeg-extra",
"binary_version": "55.0.2883.87-0ubuntu0.16.04.1263"
}
],
"availability": "No subscription required"
}