Vulnerability Name: | CVE-2018-6152 (CCN-147406) | ||||||||||||||||||||||||||||||||
Assigned: | 2018-07-24 | ||||||||||||||||||||||||||||||||
Published: | 2018-07-24 | ||||||||||||||||||||||||||||||||
Updated: | 2019-02-05 | ||||||||||||||||||||||||||||||||
Summary: | The implementation of the Page.downloadBehavior backend unconditionally marked downloaded files as safe, regardless of file type in Google Chrome prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page and user interaction. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.6 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) 8.3 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-434 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-6152 Source: BID Type: Third Party Advisory, VDB Entry 104887 Source: CCN Type: BID-104887 Google Chrome Prior to 68.0.3440.75 Multiple Security Vulnerabilities Source: REDHAT Type: Third Party Advisory RHSA-2018:2282 Source: CCN Type: Google Chrome Releases Web site Stable Channel Update for Desktop Source: CONFIRM Type: Vendor Advisory https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html Source: MISC Type: Exploit, Third Party Advisory https://crbug.com/805445 Source: XF Type: UNKNOWN google-chrome-cve20186152-sec-bypass(147406) Source: GENTOO Type: Third Party Advisory GLSA-201808-01 Source: DEBIAN Type: Third Party Advisory DSA-4256 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |