{ "schema_version": "1.4.0", "id": "GHSA-qp79-v7x7-fmwp", "modified": "2025-04-11T03:33:26Z", "published": "2022-05-02T06:20:34Z", "aliases": [ "CVE-2010-1236" ], "details": "The protocolIs function in platform/KURLGoogle.cpp in WebCore in WebKit before r55822, as used in Google Chrome before 4.1.249.1036 and Flock Browser 3.x before 3.0.0.4112, does not properly handle whitespace at the beginning of a URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted javascript: URL, as demonstrated by a \\x00javascript:alert sequence.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1236" }, { "type": "WEB", "url": "https://bugs.webkit.org/show_bug.cgi?id=35948" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14067" }, { "type": "WEB", "url": "http://code.google.com/p/chromium/issues/detail?id=37383" }, { "type": "WEB", "url": "http://codereview.chromium.org/858001" }, { "type": "WEB", "url": "http://flock.com/security" }, { "type": "WEB", "url": "http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/43068" }, { "type": "WEB", "url": "http://src.chromium.org/viewvc/chrome?view=rev&revision=41244" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0212" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-04-01T22:30:00Z" } }