
Cloud Vulnerability DB
A community-led vulnerabilities database
Inappropriate implementation in File System API in Google Chrome on Windows prior to version 97.0.4692.71 allowed remote attackers to obtain potentially sensitive information through a crafted HTML page. The vulnerability was reported by Maciej Pulikowski on September 7, 2021, and was assigned a High severity rating by the Chrome security team (Chrome Release).
The vulnerability has been assigned a CVSS v3 Base Score of 6.5 (Medium severity). The attack vector is network-based (AV:N) with low attack complexity (AC:L), requires no privileges (PR:N), but does need user interaction (UI:R). The scope is unchanged (S:U), with potential high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N) (Ubuntu CVE).
The vulnerability could allow attackers to access potentially sensitive information through the File System API in Google Chrome on Windows systems. The high confidentiality impact rating suggests that the vulnerability could lead to significant information disclosure (AttackerKB).
The vulnerability was patched in Chrome version 97.0.4692.71. Users should update to this version or later to mitigate the risk. Google awarded a $10,000 bug bounty for this vulnerability report (Chrome Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."