Insufficient data validation in File System API in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass File System restrictions via a crafted HTML page and malicious file. (Chromium security severity: Low)
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html | Release Notes Vendor Advisory |
https://crbug.com/1208439 | Issue Tracking Permissions Required Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ |
Configurations
History
No history.
Information
Published : 2022-11-01 20:15
Updated : 2023-11-07 03:51
NVD link : CVE-2022-3444
Mitre link : CVE-2022-3444
CVE.ORG link : CVE-2022-3444
JSON object : View
Products Affected
- chrome
CWE
CWE-20
Improper Input Validation