Permissions, Privileges, and Access Controls in Google Chrome - CVE-2019-13748
Published: December 10, 2019 / Updated: April 8, 2020
Google Chrome
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient policy enforcement in developer tools in Google Chrome. A remote attacker can trick the victim to visit a specially crafted website, bypass implemented security measures and gain access to sensitive information.