A security researcher has published today proof-of-concept code for an unpatched Google Chrome vulnerability.
Chrome's patch delay problem
The exploit code was put together by István Kurucsai, a security researcher for Exodus Intelligence, and released today on GitHub, along with a demo video (see above).
The reason why the researcher published this proof-of-concept exploit code was to highlight a glaring hole in Google's patching process, which allows for a small interval of time during which attackers can develop Chrome exploits and launch attacks on users.
This gap comes from Chrome's IT supply chain, which involves importing and testing code from different open source projects.
In this case, Google engineers fixed a V8 security issue on March 18, which it later become public in the V8 project's changelog and source code, but had yet to reach the Chrome Stable release.
This patch is currently traveling the Chrome assembly line, which involves being integrated into the Chromium open-source browser project, and then integrated into the Chrome codebase, and then tested in Chrome Canary and Chrome Beta releases before reaching the final Stable branch in the form of a patch.
"As a result of its open-source development model, while security fixes are immediately visible in the source tree, they need time to be tested in the non-stable release channels of Chrome before they can be pushed out via the auto-update mechanism as part of a stable release to most of the user-base," Kurucsai said today in a report he published on the Exodus Intelligence website.
"In effect, there's a window of opportunity for attackers ranging from a couple days to weeks in which the vulnerability details are practically public yet most of the users are vulnerable and cannot obtain a patch," he added.
PoC code is not complete
To be clear, the exploit that Kurucsai released today is a remote code execution bug that would let an attacker run code on a user's system. However, the exploit is somewhat harmless in its current form, as it lacks a sandbox escape vulnerability to be a complete exploit chain, and be able to run code on the underlying operating system.
Nonetheless, attackers can use older Chrome sandbox escape flaws together with the Kurucsai's current RCE bug to attack users running unpatched Chrome browsers (vulnerable to older sandbox escapes bugs).
Use cases for this code would be as part of malvertising campaigns or watering hole attacks.
All the Chromium-based browsers
More browser coverage:
- Will Windows 10 users flock to Chromium Edge for exclusive 4K Netflix streaming?
- Microsoft releases Application Guard extension for Chrome and Firefox
- First image surfaces of Google Chrome's upcoming Tab Groups feature
- Former Mozilla CTO detained at US border and denied a lawyer
- Firefox to run experiment to reduce push notification permission spam
- Google fixes Chrome 'evil cursor' bug abused by tech support scam sites
- What enterprises need to know about the new Chromium-based Edge TechRepublic
- Google's most secure login system now works on Firefox and Edge, too CNET