CVE-2023-2465
vulnerability analysis and mitigation

Overview

CVE-2023-2465 is a security vulnerability discovered in Google Chrome's Cross-Origin Resource Sharing (CORS) implementation. The vulnerability was reported by @kunte_ctf on December 10, 2022, and affects versions of Google Chrome prior to 113.0.5672.63. This security issue was classified with medium severity and was patched as part of Chrome's stable channel update (Chrome Release).

Technical details

The vulnerability stems from an inappropriate implementation in the Cross-Origin Resource Sharing (CORS) mechanism in Google Chrome. The issue was assigned a medium severity rating by the Chrome security team and was fixed in version 113.0.5672.63. A bounty of $1,000 was awarded to the researcher who discovered this vulnerability (Chrome Release).

Impact

The vulnerability could allow a remote attacker to leak cross-origin data through a specially crafted HTML page (NVD). This type of vulnerability could potentially lead to unauthorized access to sensitive information across different origins.

Mitigation and workarounds

The vulnerability has been fixed in Chrome version 113.0.5672.63. Users and administrators are advised to upgrade to this version or later. The fix has been incorporated into various distributions including Debian (113.0.5672.63-1~deb11u1), Fedora, and other Chrome-based browsers (Debian Security, Gentoo Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management