Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-18345 : What You Need to Know

Learn about CVE-2018-18345, a vulnerability in Google Chrome prior to version 71.0.3578.80 that allowed remote attackers to bypass site isolation defenses. Find mitigation steps and prevention measures here.

Google Chrome prior to version 71.0.3578.80 had a vulnerability in the handling of blob URLs in Site Isolation, allowing a remote attacker to bypass site isolation defenses.

Understanding CVE-2018-18345

This CVE involves a security flaw in Google Chrome that could be exploited by a remote attacker.

What is CVE-2018-18345?

Prior to version 71.0.3578.80 of Google Chrome, a vulnerability existed in the handling of blob URLs in Site Isolation, enabling a remote attacker to evade site isolation defenses.

The Impact of CVE-2018-18345

The vulnerability allowed a remote attacker, who had already compromised the renderer process, to bypass site isolation protections by using a crafted HTML page.

Technical Details of CVE-2018-18345

This section provides more in-depth technical information about the CVE.

Vulnerability Description

The vulnerability in Google Chrome prior to version 71.0.3578.80 involved incorrect handling of blob URLs in Site Isolation, which could be exploited by a remote attacker.

Affected Systems and Versions

        Product: Chrome
        Vendor: Google
        Affected Version: < 71.0.3578.80

Exploitation Mechanism

The vulnerability allowed a remote attacker, who had already compromised the renderer process, to bypass site isolation defenses by using a created HTML page.

Mitigation and Prevention

To address CVE-2018-18345, users and organizations should take the following steps:

Immediate Steps to Take

        Update Google Chrome to version 71.0.3578.80 or newer.
        Regularly check for security updates from Google.

Long-Term Security Practices

        Implement strong web security practices to prevent remote attacks.
        Educate users on safe browsing habits and potential security risks.

Patching and Updates

        Apply patches and updates promptly to ensure the latest security fixes are in place.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now