CVE-2023-2460
📋 TL;DR
This vulnerability allows a malicious Chrome extension to bypass file access checks when a user visits a crafted HTML page. Attackers could potentially read or write files on the user's system without proper permissions. All users running vulnerable versions of Google Chrome with extensions installed are affected.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
An attacker could read sensitive files (passwords, documents) or write malicious files to the system, potentially leading to data theft or system compromise.
Likely Case
Malicious extension could access user files in directories it shouldn't have permission to, leading to privacy violations or credential theft.
If Mitigated
With proper extension vetting and user caution, impact is limited to isolated file access by already-installed malicious extensions.
🎯 Exploit Status
Requires user to install malicious extension first, then visit crafted HTML page
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 113.0.5672.63 and later
Vendor Advisory: https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome menu > Help > About Google Chrome. 2. Chrome will automatically check for updates and install version 113.0.5672.63 or later. 3. Click 'Relaunch' to restart Chrome.
🔧 Temporary Workarounds
Disable all extensions
allTemporarily disable all Chrome extensions to prevent exploitation
chrome://extensions/ → toggle off all extensions
Remove suspicious extensions
allReview and remove any unfamiliar or unnecessary extensions
chrome://extensions/ → click 'Remove' on suspicious extensions
🧯 If You Can't Patch
- Only install extensions from trusted sources and developers
- Use Chrome in guest mode or incognito mode which disables extensions
🔍 How to Verify
Check if Vulnerable:
Check Chrome version: chrome://settings/help or chrome://version
Check Version:
google-chrome --version (Linux) or check chrome://version
Verify Fix Applied:
Verify Chrome version is 113.0.5672.63 or higher
📡 Detection & Monitoring
Log Indicators:
- Chrome extension installation logs
- File access attempts from Chrome process
Network Indicators:
- Downloads of suspicious Chrome extensions
- Requests to unusual domains from Chrome
SIEM Query:
process_name:"chrome.exe" AND (event_type:"extension_install" OR file_access:"sensitive_paths")
🔗 References
- https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
- https://crbug.com/1419732
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/
- https://security.gentoo.org/glsa/202309-17
- https://www.debian.org/security/2023/dsa-5398
- https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
- https://crbug.com/1419732
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6P5RJ6UD37IPBWU3GPQNMIUFVOVCGSLY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/
- https://security.gentoo.org/glsa/202309-17
- https://www.debian.org/security/2023/dsa-5398