CVE-2023-5187

8.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Chrome's extension system that allows heap corruption. Attackers can exploit it by tricking users into installing malicious extensions and visiting crafted HTML pages. All Chrome users prior to version 117.0.5938.132 are affected.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 117.0.5938.132
Operating Systems: Windows, Linux, macOS, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to install malicious extension and visit crafted page. All default Chrome configurations are vulnerable.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution, potentially leading to data theft, ransomware deployment, or complete system control.

🟠

Likely Case

Browser compromise allowing session hijacking, credential theft, and installation of persistent malware through the malicious extension.

🟢

If Mitigated

Limited impact with proper extension vetting and user education, potentially just browser crash or denial of service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to install malicious extension plus crafted HTML page. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 117.0.5938.132 and later

Vendor Advisory: https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html

Restart Required: Yes

Instructions:

1. Open Chrome 2. Click menu (three dots) → Help → About Google Chrome 3. Chrome will automatically check for and install updates 4. Click 'Relaunch' to restart Chrome

🔧 Temporary Workarounds

Disable extension installation

all

Prevent users from installing new extensions to block the initial attack vector

chrome://settings/extensions → Toggle 'Allow extensions from other stores' to OFF

Restrict extension permissions

all

Limit existing extension permissions to reduce potential impact

chrome://extensions → Click extension → Details → Site access → Choose 'On click' or 'On specific sites'

🧯 If You Can't Patch

  • Implement strict extension whitelisting policies
  • Deploy web filtering to block known malicious HTML pages

🔍 How to Verify

Check if Vulnerable:

Check Chrome version via chrome://settings/help or 'About Google Chrome' in menu

Check Version:

google-chrome --version (Linux) or chrome://version (all platforms)

Verify Fix Applied:

Confirm Chrome version is 117.0.5938.132 or higher

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with extension-related memory errors
  • Unexpected extension installation events in system logs

Network Indicators:

  • Connections to suspicious extension repositories
  • Downloads of unusual .crx files

SIEM Query:

source="chrome" AND (event="extension_install" OR event="crash") AND version<"117.0.5938.132"

🔗 References

📤 Share & Export