The CVE-2021-21227 vulnerability is an insufficient data validation issue that could be exploited by remote attackers to achieve code execution within the target’s browser.
The vulnerability was reported to Google by Gengming Liu from the Chinese cybersecurity firm Singular Security Lab who also received a $15,000 award for this vulnerability.
The vulnerability could not be exploited by attackers to escape the Chrome sandbox, but chaining it with a sandbox escape exploit could allow the execution of malicious code on the underlying OS.
The CVE-2021-21227 flaw is linked to the CVE-2020-16040 and CVE-2020-15965 vulnerabilities that were addressed by Google in 2020. Chrome in December and September 2020, respectively.
Google has patched several serious V8 vulnerabilities in recent weeks, including some for which PoC exploits were released before patches were made available. For some of these security holes, Google warned that exploits exist in the wild.
The Chrome 90 update addressed a toatal of 9 vulnerabilities, including the CVE-2021-21227. Below the issues that were reported by external researchers:
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
(SecurityAffairs – hacking, Chrome)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.