PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-5008 Google CVE debrief

CVE-2017-5008 is a Chrome/Blink browser flaw that could let a crafted HTML page trigger attacker-controlled JavaScript during a private script method invocation, enabling universal cross-site scripting (UXSS). The issue was publicly disclosed on 2017-02-17 and was addressed in Chrome updates before 56.0.2924.76 on Linux, Windows, and Mac, and before 56.0.2924.87 on Android.

Vendor
Google
Product
CVE-2017-5008
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-17
Original CVE updated
2026-05-13
Advisory published
2017-02-17
Advisory updated
2026-05-13

Who should care

Anyone managing or using Google Chrome on desktop or Android should care, especially security teams responsible for browser patching, endpoint management, and web-facing user populations. Because the flaw involves browser code execution in a UXSS context, organizations that rely on Chrome for access to sensitive web applications should prioritize remediation.

Technical summary

NVD classifies the issue as CWE-79 and assigns CVSS 3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The published description says Blink in Chrome allowed attacker-controlled JavaScript to run during invocation of a private script method, which could allow arbitrary script or HTML injection via a crafted page. The practical impact is cross-origin script execution in the browser context, which can undermine same-origin protections and expose session- or application-level data.

Defensive priority

Medium. The CVSS score is 6.1, but the browser UXSS impact can be high for organizations that use Chrome as a primary access path to sensitive web applications. Patch priority should be elevated for managed fleets that have not yet moved past the fixed Chrome releases.

Recommended defensive actions

  • Update Google Chrome to a version at or above 56.0.2924.76 on Linux, Windows, and Mac, or 56.0.2924.87 on Android.
  • Verify managed browser update channels and confirm affected endpoints are no longer on versions at or below 55.0.2883.87, as reflected in the NVD CPE range.
  • Apply vendor-provided Linux distribution/browser security updates referenced by the Chrome advisory and downstream errata where applicable.
  • Check asset inventories for unmanaged or out-of-support Chrome installations and remove or isolate them until patched.
  • Prioritize remediation on systems that access sensitive internal applications, since UXSS can bypass web-origin boundaries and expose confidential data.

Evidence notes

The core behavior and fixed-version information come from the CVE description in the supplied NVD record. The NVD metadata lists CWE-79 and the CVSS 3.0 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, supporting a browser-based, user-interaction-required cross-site scripting/UXSS assessment. Official and vendor references in the corpus include the Chrome stable channel release notice, the Chrome issue tracker entry, and downstream advisories from Red Hat, Debian, and Gentoo, indicating coordinated remediation across vendor ecosystems.

Official resources

Publicly disclosed on 2017-02-17 per the CVE/NVD record. The 2026-05-13 modification date reflects later record maintenance, not the original issue date.