Vulnerability Description
Allowing the chrome.debugger API to run on file:// URLs in DevTools in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system without file access permission via a crafted Chrome Extension.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | < 69.0.3497.81 | |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Workstation | 6.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/105215
- https://access.redhat.com/errata/RHSA-2018:2666
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.
- https://crbug.com/666299
- https://security.gentoo.org/glsa/201811-10
- http://www.securityfocus.com/bid/105215
- https://access.redhat.com/errata/RHSA-2018:2666
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.
- https://crbug.com/666299
- https://security.gentoo.org/glsa/201811-10
FAQ
What is CVE-2018-16081?
CVE-2018-16081 is a vulnerability with a CVSS score of 7.4 (HIGH). Allowing the chrome.debugger API to run on file:// URLs in DevTools in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to access files on ...
How severe is CVE-2018-16081?
CVE-2018-16081 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16081?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation.