CVE-2023-7281

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to create deceptive UI elements that appear legitimate but are actually malicious. It affects users of Google Chrome versions before 119.0.6045.105 who visit specially crafted web pages.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 119.0.6045.105
Operating Systems: Windows, macOS, Linux, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Chromium-based browsers may also be affected depending on their compositing implementation.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into entering sensitive information into fake login forms, clicking malicious buttons disguised as legitimate controls, or performing unintended actions due to UI deception.

🟠

Likely Case

Phishing attacks where attackers create convincing fake UI elements to steal credentials or trick users into downloading malware.

🟢

If Mitigated

Users who verify URLs and are cautious about unexpected UI elements would be less likely to fall victim, though the deception could still be convincing.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (visiting a malicious page) but no authentication. The technical barrier is low once the crafted HTML page is created.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 119.0.6045.105

Vendor Advisory: https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click the three-dot menu. 3. Go to Help > About Google Chrome. 4. Chrome will automatically check for and apply updates. 5. Restart Chrome when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents the crafted HTML from executing malicious compositing behavior

chrome://settings/content/javascript

Use Site Isolation

all

Limits the impact of UI spoofing by isolating sites from each other

chrome://flags/#enable-site-per-process (enable)

🧯 If You Can't Patch

  • Use alternative browsers until patching is possible
  • Implement web filtering to block known malicious sites

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in chrome://settings/help

Check Version:

google-chrome --version (Linux/Mac) or check in Chrome settings

Verify Fix Applied:

Confirm version is 119.0.6045.105 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual user reports of deceptive UI elements
  • Multiple failed login attempts from legitimate-looking interfaces

Network Indicators:

  • Traffic to domains hosting crafted HTML pages with unusual compositing behavior

SIEM Query:

source="chrome" AND (event="security_ui_spoofing" OR message="deceptive_ui")

🔗 References

📤 Share & Export