CVE-2021-21174
📋 TL;DR
This vulnerability in Google Chrome's Referrer implementation allowed attackers to bypass navigation restrictions via crafted HTML pages. It affects users running Chrome versions before 89.0.4389.72, potentially enabling unauthorized navigation to restricted sites.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Attackers could redirect users to malicious sites, bypass security controls, and potentially facilitate phishing attacks or cross-site request forgery.
Likely Case
Most probable impact is unauthorized navigation to restricted pages, potentially exposing sensitive information or enabling social engineering attacks.
If Mitigated
With proper controls like updated browsers and security policies, impact is minimal as the vulnerability is patched in current versions.
🎯 Exploit Status
Exploitation requires user interaction (visiting a crafted HTML page).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 89.0.4389.72
Vendor Advisory: https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome. 2. Click the three-dot menu. 3. Go to Help > About Google Chrome. 4. Chrome will automatically check for and install updates. 5. Restart Chrome when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allTemporarily disable JavaScript to prevent exploitation via crafted HTML pages.
chrome://settings/content/javascript
🧯 If You Can't Patch
- Use alternative browsers until Chrome can be updated.
- Implement network filtering to block suspicious HTML pages and restrict navigation.
🔍 How to Verify
Check if Vulnerable:
Check Chrome version via chrome://settings/help or 'chrome://version'.
Check Version:
google-chrome --version
Verify Fix Applied:
Verify Chrome version is 89.0.4389.72 or later.
📡 Detection & Monitoring
Log Indicators:
- Unusual navigation patterns in Chrome logs
- Referrer policy violations
Network Indicators:
- Suspicious HTML page requests with crafted referrers
SIEM Query:
source="chrome" AND (event="navigation" OR event="referrer") AND status="blocked"
🔗 References
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1158010
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCIDZ77XUDMB2EBPPWCQXPEIJERDNSNT/
- https://security.gentoo.org/glsa/202104-08
- https://www.debian.org/security/2021/dsa-4886
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1158010
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCIDZ77XUDMB2EBPPWCQXPEIJERDNSNT/
- https://security.gentoo.org/glsa/202104-08
- https://www.debian.org/security/2021/dsa-4886