vendor:
Blink
by:
Unknown
7.8
CVSS
HIGH
Serialization Vulnerability
416
CWE
Product Name: Blink
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2021-21117
CPE: a:google:blink
Metasploit:
https://www.rapid7.com/db/vulnerabilities/debian-cve-2021-21117/, https://www.rapid7.com/db/vulnerabilities/google-chrome-cve-2021-21117/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2021-21117/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21117/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21127/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21131/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21141/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21118/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21124/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21128/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21132/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21135/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2021-21117/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21129/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21133/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21134/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21137/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21138/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21139/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-21140/, https://www.rapid7.com/db/?q=CVE-2021-21117&type=&page=2, https://www.rapid7.com/db/?q=CVE-2021-21117&type=&page=2
Platforms Tested:
2021
Serialization Vulnerability in Blink
The AddOriginals function in initialize_v8_extras_binding.cc in Blink does not properly handle serialization when Transferable Streams are enabled, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML page. The vulnerability exists in the serialization process for MessagePort and DOMException objects.
Mitigation:
Apply the patch provided by the vendor to fix the serialization vulnerability. Upgrade to a version of Blink that includes the fix.