First published: Sat Sep 24 2022(Updated: )
Insufficient validation of untrusted input in Downloads in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass download restrictions via a crafted HTML page. (Chromium security severity: Low)
Credit: Axel Chong chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <109.0.5414.74 | 109.0.5414.74 |
All of | ||
Google Chrome | <109.0.5414.74 | |
Microsoft Windows Operating System | ||
Google Chrome | <109.0.5414.74 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this vulnerability is CVE-2023-0139.
The severity of CVE-2023-0139 is medium.
The affected software for CVE-2023-0139 is Google Chrome on Windows prior to version 109.0.5414.74.
A remote attacker can exploit CVE-2023-0139 by bypassing download restrictions via a crafted HTML page.
You can find more information about CVE-2023-0139 in the references: [Google Chrome Releases](https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html), [Chrome Bug Tracker](https://crbug.com/1367632), [Gentoo Security Advisory](https://security.gentoo.org/glsa/202305-10).