Vulnerabilities > CVE-2018-6112 - Use of Incorrectly-Resolved Name or Reference vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
LOW Integrity impact
NONE Availability impact
NONE Summary
Making URLs clickable and allowing them to be styled in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Leveraging/Manipulating Configuration File Search Paths This attack loads a malicious resource into a program's standard path used to bootstrap and/or provide contextual information for a program like a path variable or classpath. J2EE applications and other component based applications that are built from multiple binaries can have very long list of dependencies to execute. If one of these libraries and/or references is controllable by the attacker then application controls can be circumvented by the attacker. A standard UNIX path looks similar to this If the attacker modifies the path variable to point to a locale that includes malicious resources then the user unwittingly can execute commands on the attackers' behalf: This is a form of usurping control of the program and the attack can be done on the classpath, database resources, or any other resources built from compound parts. At runtime detection and blocking of this attack is nearly impossible, because the configuration allows execution.
- DLL Search Order Hijacking The attacker exploits the functionality of the Windows DLL loader where the process loading the DLL searches for the DLL to be loaded first in the same directory in which the process binary resides and then in other directories (e.g., System32). Exploitation of this preferential search order can allow an attacker to make the loading process load the attackers' rogue DLL rather than the legitimate DLL. For instance, an attacker with access to the file system may place a malicious ntshrui.dll in the C:\Windows directory. This DLL normally resides in the System32 folder. Process explorer.exe which also resides in C:\Windows, upon trying to load the ntshrui.dll from the System32 folder will actually load the DLL supplied by the attacker simply because of the preferential search order. Since the attacker has placed its malicious ntshrui.dll in the same directory as the loading explorer.exe process, the DLL supplied by the attacker will be found first and thus loaded in lieu of the legitimate DLL. Since explorer.exe is loaded during the boot cycle, the attackers' malware is guaranteed to execute. This attack can be leveraged with many different DLLs and with many different loading processes. No forensic trails are left in the system's registry or file system that an incorrect DLL had been loaded.
- Passing Local Filenames to Functions That Expect a URL This attack relies on client side code to access local files and resources instead of URLs. When the client browser is expecting a URL string, but instead receives a request for a local file, that execution is likely to occur in the browser process space with the browser's authority to local files. The attacker can send the results of this request to the local files out to a site that they control. This attack may be used to steal sensitive authentication data (either local or remote), or to gain system profile information to launch further attacks.
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201804-22.NASL description The remote host is affected by the vulnerability described in GLSA-201804-22 (Chromium, Google Chrome: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the referenced CVE identifiers and Google Chrome Releases for details. Impact : A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, bypass content security controls, or conduct URL spoofing. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 109290 published 2018-04-24 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109290 title GLSA-201804-22 : Chromium, Google Chrome: Multiple vulnerabilities NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_36FF7A7447B111E8A7D654E1AD544088.NASL description Google Chrome Releases reports : 62 security fixes in this release : - [826626] Critical CVE-2018-6085: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-28 - [827492] Critical CVE-2018-6086: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-30 - [813876] High CVE-2018-6087: Use after free in WebAssembly. Reported by Anonymous on 2018-02-20 - [822091] High CVE-2018-6088: Use after free in PDFium. Reported by Anonymous on 2018-03-15 - [808838] High CVE-2018-6089: Same origin policy bypass in Service Worker. Reported by Rob Wu on 2018-02-04 - [820913] High CVE-2018-6090: Heap buffer overflow in Skia. Reported by ZhanJia Song on 2018-03-12 - [771933] High CVE-2018-6091: Incorrect handling of plug-ins by Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-10-05 - [819869] High CVE-2018-6092: Integer overflow in WebAssembly. Reported by Natalie Silvanovich of Google Project Zero on 2018-03-08 - [780435] Medium CVE-2018-6093: Same origin bypass in Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-01 - [633030] Medium CVE-2018-6094: Exploit hardening regression in Oilpan. Reported by Chris Rohlf on 2016-08-01 - [637098] Medium CVE-2018-6095: Lack of meaningful user interaction requirement before file upload. Reported by Abdulrahman Alqabandi (@qab) on 2016-08-11 - [776418] Medium CVE-2018-6096: Fullscreen UI spoof. Reported by WenXu Wu of Tencent last seen 2020-06-01 modified 2020-06-02 plugin id 109330 published 2018-04-25 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109330 title FreeBSD : chromium -- vulnerability (36ff7a74-47b1-11e8-a7d6-54e1ad544088) NASL family Windows NASL id GOOGLE_CHROME_66_0_3359_117.NASL description The version of Google Chrome installed on the remote Windows host is prior to 66.0.3359.117. It is, therefore, affected by a multiple unspecified vulnerabilities as noted in Chrome stable channel update release notes for April 17th, 2018. Please refer to the release notes for additional information. Note that Nessus has not attempted to exploit these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 109395 published 2018-04-27 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109395 title Google Chrome < 66.0.3359.117 Multiple Vulnerabilities NASL family MacOS X Local Security Checks NASL id MACOSX_GOOGLE_CHROME_66_0_3359_117.NASL description The version of Google Chrome installed on the remote host is prior to 66.0.3359.117. It is, therefore, affected by multiple unspecified vulnerabilities as noted in Chrome stable channel update release notes for April 17th, 2018. Please refer to the release notes for additional information. Note that Nessus has not attempted to exploit these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 109396 published 2018-04-27 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109396 title Google Chrome < 66.0.3359.117 Multiple Vulnerabilities (macOS) NASL family Fedora Local Security Checks NASL id FEDORA_2018-812B5D5A71.NASL description Update to 66.0.3359.181. Security fix for CVE-2018-6085 CVE-2018-6086 CVE-2018-6087 CVE-2018-6088 CVE-2018-6089 CVE-2018-6090 CVE-2018-6091 CVE-2018-6092 CVE-2018-6093 CVE-2018-6094 CVE-2018-6095 CVE-2018-6096 CVE-2018-6097 CVE-2018-6098 CVE-2018-6099 CVE-2018-6100 CVE-2018-6101 CVE-2018-6102 CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106 CVE-2018-6107 CVE-2018-6108 CVE-2018-6109 CVE-2018-6110 CVE-2018-6111 CVE-2018-6112 CVE-2018-6113 CVE-2018-6114 CVE-2018-6116 CVE-2018-6117 CVE-2018-6118 CVE-2018-6121 CVE-2018-6122 CVE-2018-6120 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2018-06-06 plugin id 110327 published 2018-06-06 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/110327 title Fedora 27 : chromium (2018-812b5d5a71) NASL family SuSE Local Security Checks NASL id OPENSUSE-2018-381.NASL description This update for Chromium to version 66.0.3359.117 fixes the following issues : Security issues fixed (boo#1090000) : - CVE-2018-6085: Use after free in Disk Cache - CVE-2018-6086: Use after free in Disk Cache - CVE-2018-6087: Use after free in WebAssembly - CVE-2018-6088: Use after free in PDFium - CVE-2018-6089: Same origin policy bypass in Service Worker - CVE-2018-6090: Heap buffer overflow in Skia - CVE-2018-6091: Incorrect handling of plug-ins by Service Worker - CVE-2018-6092: Integer overflow in WebAssembly - CVE-2018-6093: Same origin bypass in Service Worker - CVE-2018-6094: Exploit hardening regression in Oilpan - CVE-2018-6095: Lack of meaningful user interaction requirement before file upload - CVE-2018-6096: Fullscreen UI spoof - CVE-2018-6097: Fullscreen UI spoof - CVE-2018-6098: URL spoof in Omnibox - CVE-2018-6099: CORS bypass in ServiceWorker - CVE-2018-6100: URL spoof in Omnibox - CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools - CVE-2018-6102: URL spoof in Omnibox - CVE-2018-6103: UI spoof in Permissions - CVE-2018-6104: URL spoof in Omnibox - CVE-2018-6105: URL spoof in Omnibox - CVE-2018-6106: Incorrect handling of promises in V8 - CVE-2018-6107: URL spoof in Omnibox - CVE-2018-6108: URL spoof in Omnibox - CVE-2018-6109: Incorrect handling of files by FileAPI - CVE-2018-6110: Incorrect handling of plaintext files via file:// - CVE-2018-6111: Heap-use-after-free in DevTools - CVE-2018-6112: Incorrect URL handling in DevTools - CVE-2018-6113: URL spoof in Navigation - CVE-2018-6114: CSP bypass - CVE-2018-6115: SmartScreen bypass in downloads - CVE-2018-6116: Incorrect low memory handling in WebAssembly - CVE-2018-6117: Confusing autofill settings - Various fixes from internal audits, fuzzing and other initiatives This update also supports mitigation against the Spectre vulnerabilities: last seen 2020-06-05 modified 2018-04-23 plugin id 109236 published 2018-04-23 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109236 title openSUSE Security Update : chromium (openSUSE-2018-381) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-1195.NASL description An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Chromium is an open source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 66.0.3359.117. Security Fix(es) : * chromium-browser: Use after free in Disk Cache (CVE-2018-6085) * chromium-browser: Use after free in Disk Cache (CVE-2018-6086) * chromium-browser: Use after free in WebAssembly (CVE-2018-6087) * chromium-browser: Use after free in PDFium (CVE-2018-6088) * chromium-browser: Same origin policy bypass in Service Worker (CVE-2018-6089) * chromium-browser: Heap buffer overflow in Skia (CVE-2018-6090) * chromium-browser: Incorrect handling of plug-ins by Service Worker (CVE-2018-6091) * chromium-browser: Integer overflow in WebAssembly (CVE-2018-6092) * chromium-browser: Same origin bypass in Service Worker (CVE-2018-6093) * chromium-browser: Exploit hardening regression in Oilpan (CVE-2018-6094) * chromium-browser: Lack of meaningful user interaction requirement before file upload (CVE-2018-6095) * chromium-browser: Fullscreen UI spoof (CVE-2018-6096) * chromium-browser: Fullscreen UI spoof (CVE-2018-6097) * chromium-browser: URL spoof in Omnibox (CVE-2018-6098) * chromium-browser: CORS bypass in ServiceWorker (CVE-2018-6099) * chromium-browser: URL spoof in Omnibox (CVE-2018-6100) * chromium-browser: Insufficient protection of remote debugging prototol in DevTools (CVE-2018-6101) * chromium-browser: URL spoof in Omnibox (CVE-2018-6102) * chromium-browser: UI spoof in Permissions (CVE-2018-6103) * chromium-browser: URL spoof in Omnibox (CVE-2018-6104) * chromium-browser: URL spoof in Omnibox (CVE-2018-6105) * chromium-browser: Incorrect handling of promises in V8 (CVE-2018-6106) * chromium-browser: URL spoof in Omnibox (CVE-2018-6107) * chromium-browser: URL spoof in Omnibox (CVE-2018-6108) * chromium-browser: Incorrect handling of files by FileAPI (CVE-2018-6109) * chromium-browser: Incorrect handling of plaintext files via file:// (CVE-2018-6110) * chromium-browser: Heap-use-after-free in DevTools (CVE-2018-6111) * chromium-browser: Incorrect URL handling in DevTools (CVE-2018-6112) * chromium-browser: URL spoof in Navigation (CVE-2018-6113) * chromium-browser: CSP bypass (CVE-2018-6114) * chromium-browser: Incorrect low memory handling in WebAssembly (CVE-2018-6116) * chromium-browser: Confusing autofill settings (CVE-2018-6117) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. last seen 2020-05-31 modified 2018-04-24 plugin id 109299 published 2018-04-24 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109299 title RHEL 6 : chromium-browser (RHSA-2018:1195) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-4182.NASL description Several vulnerabilities have been discovered in the chromium web browser. - CVE-2018-6056 lokihardt discovered an error in the v8 JavaScript library. - CVE-2018-6057 Gal Beniamini discovered errors related to shared memory permissions. - CVE-2018-6060 Omair discovered a use-after-free issue in blink/webkit. - CVE-2018-6061 Guang Gong discovered a race condition in the v8 JavaScript library. - CVE-2018-6062 A heap overflow issue was discovered in the v8 JavaScript library. - CVE-2018-6063 Gal Beniamini discovered errors related to shared memory permissions. - CVE-2018-6064 lokihardt discovered a type confusion error in the v8 JavaScript library. - CVE-2018-6065 Mark Brand discovered an integer overflow issue in the v8 JavaScript library. - CVE-2018-6066 Masato Kinugawa discovered a way to bypass the Same Origin Policy. - CVE-2018-6067 Ned Williamson discovered a buffer overflow issue in the skia library. - CVE-2018-6068 Luan Herrera discovered object lifecycle issues. - CVE-2018-6069 Wanglu and Yangkang discovered a stack overflow issue in the skia library. - CVE-2018-6070 Rob Wu discovered a way to bypass the Content Security Policy. - CVE-2018-6071 A heap overflow issue was discovered in the skia library. - CVE-2018-6072 Atte Kettunen discovered an integer overflow issue in the pdfium library. - CVE-2018-6073 Omair discover a heap overflow issue in the WebGL implementation. - CVE-2018-6074 Abdulrahman Alqabandi discovered a way to cause a downloaded web page to not contain a Mark of the Web. - CVE-2018-6075 Inti De Ceukelaire discovered a way to bypass the Same Origin Policy. - CVE-2018-6076 Mateusz Krzeszowiec discovered that URL fragment identifiers could be handled incorrectly. - CVE-2018-6077 Khalil Zhani discovered a timing issue. - CVE-2018-6078 Khalil Zhani discovered a URL spoofing issue. - CVE-2018-6079 Ivars discovered an information disclosure issue. - CVE-2018-6080 Gal Beniamini discovered an information disclosure issue. - CVE-2018-6081 Rob Wu discovered a cross-site scripting issue. - CVE-2018-6082 WenXu Wu discovered a way to bypass blocked ports. - CVE-2018-6083 Jun Kokatsu discovered that AppManifests could be handled incorrectly. - CVE-2018-6085 Ned Williamson discovered a use-after-free issue. - CVE-2018-6086 Ned Williamson discovered a use-after-free issue. - CVE-2018-6087 A use-after-free issue was discovered in the WebAssembly implementation. - CVE-2018-6088 A use-after-free issue was discovered in the pdfium library. - CVE-2018-6089 Rob Wu discovered a way to bypass the Same Origin Policy. - CVE-2018-6090 ZhanJia Song discovered a heap overflow issue in the skia library. - CVE-2018-6091 Jun Kokatsu discovered that plugins could be handled incorrectly. - CVE-2018-6092 Natalie Silvanovich discovered an integer overflow issue in the WebAssembly implementation. - CVE-2018-6093 Jun Kokatsu discovered a way to bypass the Same Origin Policy. - CVE-2018-6094 Chris Rohlf discovered a regression in garbage collection hardening. - CVE-2018-6095 Abdulrahman Alqabandi discovered files could be uploaded without user interaction. - CVE-2018-6096 WenXu Wu discovered a user interface spoofing issue. - CVE-2018-6097 xisigr discovered a user interface spoofing issue. - CVE-2018-6098 Khalil Zhani discovered a URL spoofing issue. - CVE-2018-6099 Jun Kokatsu discovered a way to bypass the Cross Origin Resource Sharing mechanism. - CVE-2018-6100 Lnyas Zhang discovered a URL spoofing issue. - CVE-2018-6101 Rob Wu discovered an issue in the developer tools remote debugging protocol. - CVE-2018-6102 Khalil Zhani discovered a URL spoofing issue. - CVE-2018-6103 Khalil Zhani discovered a user interface spoofing issue. - CVE-2018-6104 Khalil Zhani discovered a URL spoofing issue. - CVE-2018-6105 Khalil Zhani discovered a URL spoofing issue. - CVE-2018-6106 lokihardt discovered that v8 promises could be handled incorrectly. - CVE-2018-6107 Khalil Zhani discovered a URL spoofing issue. - CVE-2018-6108 Khalil Zhani discovered a URL spoofing issue. - CVE-2018-6109 Dominik Weber discovered a way to misuse the FileAPI feature. - CVE-2018-6110 Wenxiang Qian discovered that local plain text files could be handled incorrectly. - CVE-2018-6111 Khalil Zhani discovered a use-after-free issue in the developer tools. - CVE-2018-6112 Khalil Zhani discovered incorrect handling of URLs in the developer tools. - CVE-2018-6113 Khalil Zhani discovered a URL spoofing issue. - CVE-2018-6114 Lnyas Zhang discovered a way to bypass the Content Security Policy. - CVE-2018-6116 Chengdu Security Response Center discovered an error when memory is low. - CVE-2018-6117 Spencer Dailey discovered an error in form autofill settings. last seen 2020-06-01 modified 2020-06-02 plugin id 109411 published 2018-04-30 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109411 title Debian DSA-4182-1 : chromium-browser - security update NASL family Fedora Local Security Checks NASL id FEDORA_2018-94E1BC8C23.NASL description Update to 66.0.3359.181. Security fix for CVE-2018-6085 CVE-2018-6086 CVE-2018-6087 CVE-2018-6088 CVE-2018-6089 CVE-2018-6090 CVE-2018-6091 CVE-2018-6092 CVE-2018-6093 CVE-2018-6094 CVE-2018-6095 CVE-2018-6096 CVE-2018-6097 CVE-2018-6098 CVE-2018-6099 CVE-2018-6100 CVE-2018-6101 CVE-2018-6102 CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106 CVE-2018-6107 CVE-2018-6108 CVE-2018-6109 CVE-2018-6110 CVE-2018-6111 CVE-2018-6112 CVE-2018-6113 CVE-2018-6114 CVE-2018-6116 CVE-2018-6117 CVE-2018-6118 CVE-2018-6121 CVE-2018-6122 CVE-2018-6120 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2019-01-03 plugin id 120630 published 2019-01-03 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/120630 title Fedora 28 : chromium (2018-94e1bc8c23)
Redhat
advisories |
| ||||
rpms |
|