CVE-2019-13741
📋 TL;DR
This vulnerability in Google Chrome's Blink rendering engine allows a local attacker to bypass same-origin policy restrictions via malicious clipboard content. Attackers could potentially read sensitive data from other websites or perform unauthorized actions. Users of affected Chrome versions are at risk.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Enterprise Linux For Scientific Computing by Redhat
View all CVEs affecting Enterprise Linux For Scientific Computing →
Enterprise Linux For Scientific Computing by Redhat
View all CVEs affecting Enterprise Linux For Scientific Computing →
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
An attacker could steal sensitive data (passwords, session tokens, personal information) from other websites the user has open, potentially leading to account takeover and data breaches.
Likely Case
Attackers could read limited data from other websites via clipboard manipulation, potentially capturing copied text or form data.
If Mitigated
With proper browser isolation and updated software, impact is minimal as the vulnerability requires local access and specific conditions.
🎯 Exploit Status
Exploitation requires local access and user interaction (clipboard manipulation). No public exploit code is known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 79.0.3945.79 and later
Vendor Advisory: https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome settings 2. Click 'About Chrome' 3. Allow Chrome to update automatically 4. Restart Chrome when prompted
🔧 Temporary Workarounds
Disable clipboard access
allRestrict websites from accessing clipboard via browser settings or extensions
Use browser isolation
allRun Chrome in sandboxed environment or use separate browser profiles for sensitive sites
🧯 If You Can't Patch
- Implement application-level controls to prevent sensitive data exposure via client-side scripts
- Use browser extensions that block clipboard access or enforce stricter same-origin policies
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in settings. If version is below 79.0.3945.79, system is vulnerable.
Check Version:
chrome://version/ or 'google-chrome --version' on Linux
Verify Fix Applied:
Confirm Chrome version is 79.0.3945.79 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual clipboard access patterns in browser logs
- Cross-origin resource access attempts
Network Indicators:
- Unexpected cross-origin requests from browser sessions
SIEM Query:
Browser logs showing clipboard API calls across different origins within short timeframes
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:4238
- https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
- https://crbug.com/1011950
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://seclists.org/bugtraq/2020/Jan/27
- https://security.gentoo.org/glsa/202003-08
- https://www.debian.org/security/2020/dsa-4606
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:4238
- https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
- https://crbug.com/1011950
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://seclists.org/bugtraq/2020/Jan/27
- https://security.gentoo.org/glsa/202003-08
- https://www.debian.org/security/2020/dsa-4606