CVE-2023-4357

8.8 HIGH

📋 TL;DR

This vulnerability in Google Chrome allows attackers to bypass file access restrictions through malicious XML input in crafted HTML pages. It affects Chrome users on all platforms who haven't updated to version 116.0.5845.96 or later. Attackers can potentially access local files they shouldn't be able to reach.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 116.0.5845.96
Operating Systems: Windows, Linux, macOS, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Enterprise deployments with XML parsing disabled via policy may be protected.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete file system access leading to data theft, credential harvesting, or malware deployment through file writes.

🟠

Likely Case

Limited file access to user-accessible directories, potentially exposing sensitive documents or browser data.

🟢

If Mitigated

No impact if Chrome is fully patched or if XML parsing is disabled via enterprise policies.

🌐 Internet-Facing: HIGH - Attackers can exploit via malicious websites visited by users.
🏢 Internal Only: MEDIUM - Requires user interaction with malicious content, but internal phishing could facilitate exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires user to visit malicious website but no authentication needed. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 116.0.5845.96 and later

Vendor Advisory: https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' when prompted. For enterprise: Deploy Chrome 116.0.5845.96+ via your management system.

🔧 Temporary Workarounds

Disable XML parsing via enterprise policy

all

Prevents Chrome from processing XML content that could trigger the vulnerability

Set Chrome policy: 'DefaultPluginsSetting' = 2 (Block plugins)

Use site isolation

all

Enable site isolation to limit impact of potential exploitation

Navigate to chrome://flags/#enable-site-per-process and enable

🧯 If You Can't Patch

  • Use alternative browser until Chrome can be updated
  • Implement network filtering to block known malicious sites and restrict XML content

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: If below 116.0.5845.96, you are vulnerable.

Check Version:

chrome://version/ or 'google-chrome --version' on Linux/macOS

Verify Fix Applied:

Confirm Chrome version is 116.0.5845.96 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access attempts from Chrome process
  • XML parsing errors in Chrome logs

Network Indicators:

  • Requests to unusual local file paths from web content
  • XML content loading from untrusted sources

SIEM Query:

process_name:"chrome.exe" AND (file_access:"file://" OR xml_parse_error)

🔗 References

📤 Share & Export