Security restrictions bypass in Google Chrome - CVE-2018-18357
Published: December 5, 2018
Vulnerability identifier: #VU16270
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-18357
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Google
Affected software:
Google Chrome
Google Chrome
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to insufficient policy enforcement in URL Formatter when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website and bypass security restrictions to conduct further attacks.
The weakness exists due to insufficient policy enforcement in URL Formatter when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website and bypass security restrictions to conduct further attacks.
How to mitigate CVE-2018-18357
Update to version 71.0.3578.80.