CVE-2018-6152

CRITICAL

Google Chrome <66.0.3359.117 - Code Injection

Title source: llm
STIX 2.1

Description

The implementation of the Page.downloadBehavior backend unconditionally marked downloaded files as safe, regardless of file type in Google Chrome prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page and user interaction.

References (6)

Core 6
Core References
Issue Tracking x_refsource_misc
https://crbug.com/805445
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:2282
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201808-01
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2018/dsa-4256
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/104887

Scores

CVSS v3 9.6
EPSS 0.0086
EPSS Percentile 75.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Details

CWE
CWE-434
Status published
Products (5)
debian/debian_linux 9.0
google/chrome < 66.0.3359.106
redhat/enterprise_linux_desktop 6.0
redhat/enterprise_linux_server 6.0
redhat/enterprise_linux_workstation 6.0
Published Dec 04, 2018
Tracked Since Feb 18, 2026