Description
The implementation of the Page.downloadBehavior backend unconditionally marked downloaded files as safe, regardless of file type in Google Chrome prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page and user interaction.
References (6)
Core 6
Core References
Release Notes, Vendor Advisory x_refsource_confirm
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
Issue Tracking x_refsource_misc
https://crbug.com/805445
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:2282
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201808-01
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2018/dsa-4256
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/104887
Scores
CVSS v3
9.6
EPSS
0.0086
EPSS Percentile
75.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (5)
debian/debian_linux
9.0
google/chrome
< 66.0.3359.106
redhat/enterprise_linux_desktop
6.0
redhat/enterprise_linux_server
6.0
redhat/enterprise_linux_workstation
6.0
Published
Dec 04, 2018
Tracked Since
Feb 18, 2026