{"id":597983,"date":"2023-01-16T05:50:32","date_gmt":"2023-01-16T11:50:32","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/01\/16\/chrome-vulnerability-could-have-led-to-widespread-data-theft\/"},"modified":"2023-01-16T05:50:32","modified_gmt":"2023-01-16T11:50:32","slug":"chrome-vulnerability-could-have-led-to-widespread-data-theft","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/01\/16\/chrome-vulnerability-could-have-led-to-widespread-data-theft\/","title":{"rendered":"Chrome vulnerability could have led to widespread data theft"},"content":{"rendered":"<div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.computerweekly.com\/visuals\/German\/article\/https-browser-adobe_searchsitetablet_520X173.jpg\" data-credit=\"andranik123 - stock.adobe.com\"  width=\"520\" height=\"173\" alt><\/p>\n<p>andranik123 &#8211; stock.adobe.com<\/p>\n<\/p><\/div>\n<div id=\"content-header\">\n<h2>A dangerous vulnerability in Google Chrome and Chromium-based browsers could have put billions of users\u2019 files at risk of being stolen<\/h2>\n<\/div>\n<div id=\"content-center\">\n<ul>\n<li><i data-icon=\"1\"><\/i><\/li>\n<li><i data-icon=\"2\"><\/i><\/li>\n<\/ul>\n<div id=\"contributors-block\">\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/computerweekly\/Alex-Scroxton-CW-Contributor-2022.jpg\" alt=\"Alex Scroxton\">\n\t\t\t\t\t<\/p>\n<p><span>By<\/span><\/p>\n<ul>\n<li>\n\t\t\t\t\t<a href=\"https:\/\/www.techtarget.com\/contributor\/Alex-Scroxton\">Alex Scroxton,<\/a><br \/>\n\t\t\t\t\t\t<span>Security Editor<\/span>\n\t\t\t\t\t\t<\/li>\n<\/ul>\n<p>\n\tPublished: <span>12 Jan 2023 11:03<\/span>\n<\/p>\n<\/div>\n<section id=\"content-body\">\n<p>Researchers at <a href=\"https:\/\/www.imperva.com\/\">Imperva<\/a> have revealed their hand in uncovering and fixing a potentially dangerous vulnerability in Google\u2019s <a href=\"https:\/\/www.techtarget.com\/searchmobilecomputing\/definition\/Google-Chrome-browser\">Chrome and Chromium-based browsers<\/a> that, left untreated, could have enabled threat actors to steal sensitive files from more than 2.5 billion worldwide users of the web browsing technology.<\/p>\n<p>Tracked as CVE-2022-3656, the vulnerability was first uncovered in 2022 by Imperva\u2019s red team, which was looking into how the browser interacts with the file system, specifically in how browsers process symbolic links \u2013 also known as symlinks.<\/p>\n<p>Symlinks are files that point to another file or directory, which enable the operating system to treat the linked file as if it were present at the symlink\u2019s location. They are used for creating shortcuts, redirecting file paths, or better organising files, explained Imperva\u2019s Ron Masas, who is credited with discovering the bug.<\/p>\n<p>\u201cIn the case of the vulnerability we disclosed to Google, the issue arose from the way the browser interacted with symlinks when processing files and directories,\u201d <a href=\"https:\/\/www.imperva.com\/blog\/google-chrome-symstealer-vulnerability\/\">explained Masas in his write-up<\/a>.<\/p>\n<p>\u201cSpecifically, the browser did not properly check if the symlink was pointing to a location that was not intended to be accessible, which allowed for the theft of sensitive files. This issue is commonly known as symbolic link following.\u201d<\/p>\n<p>In one potential attack scenario exploiting CVE-2022-3656, an attacker could create a fake website to offer a crypto wallet service, tricking the user into creating a new wallet by downloading supposed recovery keys in the form of zip file, which in fact contained a symlink to a sensitive file or folder on the user\u2019s computer, such as a cloud service credential.<\/p>\n<p>If the file was unzipped and the malicious recovery keys uploaded back to the website, the symlink would be processed and the attacker would gain access to the sensitive file.<\/p>\n<p>In such a scenario, the victim may not even notice they had been tricked, since a great many crypto wallets or other online services require their users to download recovery keys to serve as backups should they lose access to their account, perhaps because they had forgotten their password.<\/p>\n<p><a href=\"https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=1345275\">Masas was able to create a proof-of-concept attack<\/a> using CSS to manipulate the file input element in the browser. When the file input element was made larger, he was able to ensure any file dropped onto the page would be uploaded, which in turn let him exploit the symlink vulnerability to exfiltrate files.<\/p>\n<p>He noted that cyber criminals are increasingly targeting people holding cryptocurrencies by exploiting software vulnerabilities to access their wallets and steal funds, so if using Chrome or a Chromium-based browser \u2013 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-3656\">such as Microsoft Edge<\/a> \u2013 it is important to keep them up to date, and to exercise increased diligence when downloading files. Users may also wish to consider using a hardware wallet to store crypto assets, and improving the security of their credentials with password managers or multifactor authentication (MFA).<\/p>\n<p>Masas reported the symlink vulnerability to Google, which issued a fix <a href=\"https:\/\/chromereleases.googleblog.com\/2022\/10\/stable-channel-update-for-desktop_25.html\">in the Chrome 107 update on 25 October 2022<\/a>. However, when Masas and his team tested this out, they found that the issue was not fully addressed. It has now been fully resolved in the Chrome 108 update, <a href=\"https:\/\/chromereleases.googleblog.com\/2022\/11\/stable-channel-update-for-desktop_29.html\">which was released on 29 November<\/a> (note this additional fix is <em>not<\/em> disclosed in Google\u2019s official release update).<\/p>\n<p>\u201cWe would like to thank Google for their response to this issue and for their cooperation in addressing it,\u201d said Masas.<\/p>\n<p>\u201cIt was a privilege to work with the Google team and help make Chrome a safer and more secure browser for all users. We take pride in our ability to identify and disclose vulnerabilities, and we are committed to working with software vendors to ensure that the products we all rely on are as secure as possible.\u201d<\/p>\n<\/section>\n<section id=\"DigDeeperSplash\">\n<h4>\n\t\t\t<i data-icon=\"m\"><\/i>Read more on Application security and coding requirements<\/h4>\n<ul>\n<li><a id=\"DigDeeperItem-1\" href=\"https:\/\/www.techtarget.com\/searchenterprisedesktop\/answer\/Exploring-Edge-Chromium-requirements-for-system-admins\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/container_g1294273513_searchsitetablet_520X173.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/container_g1294273513_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/container_g1294273513.jpg 1280w\" alt ><\/p>\n<h5>Exploring Edge Chromium requirements for system admins<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineImages\/olsen_gary.jpg\" alt=\"GaryOlsen\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Gary\u00a0Olsen<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<li><a id=\"DigDeeperItem-2\" href=\"https:\/\/www.techtarget.com\/searchmobilecomputing\/definition\/Google-Chrome-browser\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/2.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/2_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/2.jpg 1280w\" alt ><\/p>\n<h5>Google Chrome browser<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/barney_nick.jpg\" alt=\"NickBarney\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Nick\u00a0Barney<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<li><a id=\"DigDeeperItem-3\" href=\"https:\/\/www.computerweekly.com\/news\/252528083\/Google-MS-Oracle-vulnerabilities-make-November-22-a-big-month-for-patching\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/visuals\/LeMagIT\/hero_article\/Security-management-Gorodenkoff-Productions-OU-hero_searchsitetablet_520X173.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/visuals\/LeMagIT\/hero_article\/Security-management-Gorodenkoff-Productions-OU-hero_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/visuals\/LeMagIT\/hero_article\/Security-management-Gorodenkoff-Productions-OU-hero.jpg 1280w\" alt ><\/p>\n<h5>Google, MS, Oracle vulnerabilities make November \u201922 a big month for patching<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/computerweekly\/Alex-Scroxton-CW-Contributor-2022.jpg\" alt=\"AlexScroxton\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Alex\u00a0Scroxton<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<li><a id=\"DigDeeperItem-4\" href=\"https:\/\/www.computerweekly.com\/blog\/CW-Developer-Network\/Cloudinary-clarity-Google-ditches-JPEG-XL-where-do-we-go-from-here\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/4.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/4_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/4.jpg 1280w\" alt ><\/p>\n<h5>Cloudinary clarity: Google ditches JPEG XL, where do we go from here?<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/computerweekly\/Adrian-Bridgwater-60px.jpg\" alt=\"AdrianBridgwater\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Adrian\u00a0Bridgwater<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<\/ul>\n<\/section>\n<\/div>\n<p><a href=\"https:\/\/www.computerweekly.com\/news\/252529119\/Chrome-vulnerability-could-have-led-to-widespread-data-theft\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Tami Mcnaught<\/p>\n","protected":false},"excerpt":{"rendered":"<p>andranik123 &#8211; stock.adobe.com A dangerous vulnerability in Google Chrome and Chromium-based browsers could have put billions of users\u2019 files at risk of being stolen By Alex Scroxton, Security Editor Published: 12 Jan 2023 11:03 Researchers at Imperva have revealed their hand in uncovering and fixing a potentially dangerous vulnerability in Google\u2019s Chrome and Chromium-based browsers<\/p>\n","protected":false},"author":1,"featured_media":597984,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22867,46,25641],"tags":[],"class_list":{"0":"post-597983","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-chrome","8":"category-technology","9":"category-vulnerability"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/597983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=597983"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/597983\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/597984"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=597983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=597983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=597983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}