Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)
References
| Link | Resource |
|---|---|
| https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html | Release Notes Vendor Advisory |
| https://crbug.com/1467751 | Permissions Required |
| https://www.debian.org/security/2023/dsa-5479 | Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/ | Mailing List Third Party Advisory |
Information
Published : 2023-08-15 18:15
Updated : 2023-08-22 13:42
NVD link : CVE-2023-4368
Mitre link : CVE-2023-4368
JSON object : View
Products Affected
debian
- debian_linux
- chrome
CWE
