Description
Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 89.0.4389.72 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
Remediation
References
https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
https://crbug.com/1150810
https://www.debian.org/security/2021/dsa-4886
https://security.gentoo.org/glsa/202104-08
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCIDZ77XUDMB2EBPPWCQXPEIJERDNSNT/
Related Vulnerabilities
CVE-2020-6423 Vulnerability in npm package electron
CVE-2019-10347 Vulnerability in maven package javagh.jenkins:mashup-portlets-plugin
CVE-2023-42503 Vulnerability in maven package org.apache.commons:commons-compress
CVE-2023-31062 Vulnerability in maven package org.apache.inlong:manager-service
CVE-2020-8203 Vulnerability in maven package org.webjars.npm:lodash