A URL parsing issue in goog.uri of the Google Closure Library versions up to and including v20200224 allows an attacker to send malicious URLs to be parsed by the library and return the wrong authority. Mitigation: update your library to version v20200315.
The product uses a regular expression that does not sufficiently restrict the set of allowed values.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Closure_library | * | 20200315 (excluding) | |
Chromium-browser | Ubuntu | trusty | * |
Qtwebengine-opensource-src | Ubuntu | bionic | * |
Qtwebengine-opensource-src | Ubuntu | eoan | * |
Qtwebengine-opensource-src | Ubuntu | groovy | * |
Qtwebengine-opensource-src | Ubuntu | hirsute | * |
Qtwebengine-opensource-src | Ubuntu | impish | * |
Qtwebengine-opensource-src | Ubuntu | kinetic | * |
Qtwebengine-opensource-src | Ubuntu | lunar | * |
Qtwebengine-opensource-src | Ubuntu | mantic | * |
Qtwebengine-opensource-src | Ubuntu | trusty | * |
This effectively causes the regexp to accept substrings that match the pattern, which produces a partial comparison to the target. In some cases, this can lead to other weaknesses. Common errors include: