
Google has unintentionally leaked particulars about an unfixed difficulty in Chromium that retains JavaScript working within the background even when the browser is closed, permitting distant code execution on the system.
The flaw was reported by safety researcher Lyra Rebane and acknowledged as legitimate in December 2022, as per the thread on Chromium Difficulty Tracker.
An attacker might exploit the issue to create a malicious webpage with a Service Employee, reminiscent of a obtain activity, that by no means terminates. Rebane says that this might enable an attacker to execute JavaScript code on the guests’ units.
“It is reasonable to get tens of hundreds of pageviews for making a ‘botnet’, and folks will not remember that JavaScript may be remotely executed on their system,” Rebane says within the authentic bug report.
Potential exploitation situations embody utilizing compromised browsers to launch distributed denial-of-service (DDoS) assaults, proxying malicious visitors, and arbitrarily redirecting visitors to focus on websites.
The problem impacts all Chromium-based browsers, together with Google Chrome, Microsoft Edge, Courageous, Opera, Vivaldi, and Arc.
Persistent bug
On October 26, 2024, a Google developer seen that the problem was nonetheless open and described it as a “severe vulnerability” that wanted a standing replace “to make sure that there’s progress.”
This yr, on February 10, the problem was marked as mounted and reopened just some minutes later resulting from a number of considerations.
Because it was a safety downside, the labels for the bug have been up to date so it might undergo the Chrome Vulnerability Rewards Program (VRP) Panel, and the problem was marked as mounted on February 12, though a patch had not been shipped.
An automatic electronic mail knowledgeable Rebane that she had been awarded a bug bounty of $1,000.
All entry restrictions on Chromium Difficulty Tracker have been eliminated on Might 20, because the bug had been closed for greater than 14 weeks and marked as mounted within the system.
On the identical day, Rebane examined the repair and seen that the issue was nonetheless current in Chrome Dev 150 and Edge 148.
“Again in 2022, I discovered a bug that might let me, with no person interplay, flip any Chromium-based browser right into a everlasting JS botnet member,” the researcher stated in a publish yesterday.
“In Edge, you would not even discover something misplaced, and would keep linked to the C2 even after closing the browser.”
After noticing that the exploit nonetheless labored, the researcher realized that Google had doubtless printed the small print by mistake.
To make issues worse, the obtain pop up that appeared when triggering the exploit beforehand not comes up within the newest Edge, making the exploit even stealthier.
“OH NO I JUST REALIZED THIS IS NOT ACTUALLY PROPERLY FIXED AND STILL WORKS,” posted Rebane on Mastodon.
“Even worse, Edge not even makes the obtain menu pop up, so it is utterly silent JS RCE that retains working even after you shut the browser !! all from simply visiting a single web site as soon as !!”
Though the problem was made personal once more, the publicity lasted lengthy sufficient for the data to leak.
Rebane advised Ars Technica that Google’s publicity would make exploitation “fairly simple,” nevertheless, scaling it into a big botnet is extra sophisticated.
She additionally clarified that the bug doesn’t bypass browser safety boundaries and doesn’t give attackers entry to the sufferer’s emails, information, or the host OS.
On condition that the problem particulars have been leaked, the danger to a lot of customers is important, and Google will most probably deal with this as pressing, releasing emergency fixes quickly.
BleepingComputer has reached out to Google for a touch upon this publicity, however we’ve not acquired a response by publication.
Automated pentesting instruments ship actual worth, however they have been constructed to reply one query: can an attacker transfer by the community? They weren’t constructed to check whether or not your controls block threats, your detection guidelines fireplace, or your cloud configs maintain.
This information covers the 6 surfaces you really have to validate.

