Tuesday, March 4, 2025
HomeCVE/vulnerabilityCritical Chrome Vulnerabilities Let Malicious Apps Run Shell Command on Your PC

Critical Chrome Vulnerabilities Let Malicious Apps Run Shell Command on Your PC

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered vulnerabilities in the Chromium web browser that allowed malicious extensions to escape the sandbox and execute arbitrary code on the user’s system. 

These vulnerabilities exploited the privileged nature of WebUI pages, which provide the user interface for Chromium’s features and have access to private APIs that can bypass the sandbox. 

It has been found that malicious scripts could trigger certain actions on WebUI pages to circumvent security checks and execute arbitrary code, potentially leading to serious security consequences.

Settings
Settings

The Chromium enterprise policy system allows administrators to control Chrome settings remotely. While typically requiring Google account association, user policies can be set locally through a JSON file. 

Join ANY.RUN's FREE webinar on How to Improve Threat Investigations on Oct 23 - Register Here 

However, the lack of a direct editing interface presents a challenge, which explores the potential for an undocumented feature in the WebUI to modify these policies, offering a more convenient method for administrators to manage Chrome settings.

Policies
Policies

A vulnerability was discovered in the Chrome policy test page. By exploiting a private API exposed by the WebUI code and the lack of proper validation on the C++ side, researchers were able to set arbitrary user policies through Javascript code injection on chrome://policy/test, even though the PolicyTestPageEnabled policy was disabled. 

This bug exists because the IsPolicyTestingEnabled() function doesn’t properly check the kPolicyTestPageEnabled policy due to a null PrefService argument.

For Chromium builds (without Google Chrome branding), the channel check always passes due to Channel::UNKNOWN being the same as Channel::DEFAULT.  

Policy Tests
Policy Tests

A sandbox escape vulnerability is described in Chrome extensions through the chrome.devtools.inspectedWindow API.

By exploiting the fact that the inspected page and the devtools page are different processes, the extension can call inspectedWindow.reload() before the devtools page disables the API. 

This injects arbitrary javascript code to the inspectedWebUI page, such as chrome://policy, while the injected code can then set arbitrary user policies to achieve sandbox escape.  

It describes a Chrome extension vulnerability that exploits a race condition in chrome.devtools.inspectedWindow.reload() to achieve sandbox escape, and the original exploit injects a script into chrome://policy to set malicious policies. 

Code execution result
Code execution result

A more reliable exploit utilizes the fact that debugger requests persist after a tab crash.

By triggering a debugger crash twice and then calling chrome.devtools.inspectedWindow.reload(), the exploit injects a script that navigates to chrome://settings to achieve sandbox escape.  

Ading2210 discovered a high-severity vulnerability in Chrome’s DevTools. The vulnerability exploits a race condition to execute arbitrary JavaScript code on inspected pages. 

Google quickly acknowledged the issue and implemented fixes to prevent the exploitation of this vulnerability. The researcher was awarded $20,000 for their discovery. 

The vulnerability, assigned CVE-2024-5836 and CVE-2024-6778, highlights the importance of thorough security testing, even for older code, and the risks of shipping undocumented or insecure features.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...