Security bypass vulnerabilties at Google Chrome

Обновлено: 03/06/2020
Дата обнаружения
Уровень угрозы

Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions.

Below is a complete list of vulnerabilities

  1. Improper method restrictions at Google V8 can be exploited remotely via a specially designed method call to bypass same origin policy;
  2. Lack of information propagation at Blink can be exploited remotely via a specially designed HTML to bypass same origin policy.

Technical details

(1) located at object-observe.js and can be exploited via a observer or getNotifier calls.

(2) located at bindings/core/v8/V8DOMWrapper.h and caused by not performing a rethrow action about cross-context exception. Can be exploited via HTML containing IFRAME.

Пораженные продукты

Google Chrome versions earlier than 45.0.2454.101 (all branches)


Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.
Google Chrome

Первичный источник обнаружения
Google Chrome blog entry
Оказываемое влияние
Связанные продукты
Google Chrome
Узнай статистику распространения уязвимостей в твоем регионе