Description
Incorrect application of sandboxing in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted MHTML page.
Exploits (2)
exploitdb
WORKING POC
by Anton Lopanitsyn · textlocalmultiple
https://www.exploit-db.com/exploits/45867
References (9)
Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/101482
Various Sources x_refsource_misc
https://www.reddit.com/r/netsec/comments/7cus2h/chrome_61_uxss_exploit_cve20175124/
Release Notes, Vendor Advisory x_refsource_misc
https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
Issue Tracking x_refsource_misc
https://crbug.com/762930
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2017/dsa-4020
Various Sources x_refsource_misc
https://chromium.googlesource.com/chromium/src/+/4558c2885e618557a674660aff57404d25537070
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:2997
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201710-24
Various Sources x_refsource_misc
https://github.com/Bo0oM/CVE-2017-5124
Scores
CVSS v3
6.1
EPSS
0.1909
EPSS Percentile
95.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (3)
debian/debian_linux
8.0
debian/debian_linux
9.0
google/chrome
< 62.0.3202.62
Published
Feb 07, 2018
Tracked Since
Feb 18, 2026