CVE-2021-38000

Published on: 11/23/2021 12:00:00 AM UTC

Last Modified on: 11/24/2021 04:33:00 PM UTC

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Certain versions of Android from Google contain the following vulnerability:

Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page.

  • CVE-2021-38000 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.
  • Affected Vendor/Software: URL Logo Google - Chrome version < 95.0.4638.69

CVSS3 Score: 6.1 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED LOW LOW NONE

CVSS2 Score: 5.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL NONE

CVE References

Description Tags Link
1249962 - chromium - An open-source project to help move the web forward. - Monorail crbug.com
text/html
URL Logo MISC crbug.com/1249962
Chrome Releases: Stable Channel Update for Desktop chromereleases.googleblog.com
text/html
URL Logo MISC chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html

Related QID Numbers

  • 376000 Google Chrome Prior to 95.0.4638.69 Multiple Vulnerabilities
  • 376010 Microsoft Edge Based on Chromium Prior to 95.0.1020.40 Multiple Vulnerabilities
  • 690221 Free Berkeley Software Distribution (FreeBSD) Security Update for chromium (976d7bf9-38ea-11ec-b3b0-3065ec8fd3ec)
  • 751335 OpenSUSE Security Update for chromium (openSUSE-SU-2021:1462-1)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
GoogleAndroid-AllAllAll
ApplicationGoogleChromeAllAllAllAll
  • cpe:2.3:o:google:android:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @pwn_expoit [$N/A][1249962] High CVE-2021-38000 : Insufficient validation of untrusted input in Intents. Reported by Clement Le… twitter.com/i/web/status/1… 2021-10-28 21:58:02
Twitter Icon @tukanana “Googleは、CVE-2021-38000およびCVE-2021-38003のエクスプロイトが実際に存在することを認識しています。 ”0-day案件。 / 1件のコメント b.hatena.ne.jp/entry?url=http… “St… twitter.com/i/web/status/1… 2021-10-28 22:31:27
Twitter Icon @maddiestone Two in-the-wild 0-days patched by Chrome: CVE-2021-38000 and CVE-2021-38003. Both discovered by Google TAG! @_clem1… twitter.com/i/web/status/1… 2021-10-28 23:50:08
Twitter Icon @ipssignatures The vuln CVE-2021-38000 has a tweet created 0 days ago and retweeted 16 times. twitter.com/maddiestone/st… #pow1rtrtwwcve 2021-10-29 02:06:01
Twitter Icon @haeretics 8件の脆弱性に対処。「CVE-2021-38000」と「CVE-2021-38003」はすでに悪用を確認。「CVE-2021-38001」「CVE-2021-38002」は中国のハッキングコンテスト「天府杯」で報告され、すでに攻撃… twitter.com/i/web/status/1… 2021-10-29 02:15:04
Twitter Icon @adehohum @maddiestone @_clem1 @neelmehta @5aelo We are particularly excited about the nice round number for CVE-2021-38000. CVE-2021-38-ooooh! 2021-10-29 03:42:52
Twitter Icon @cKure7 ■■■■■ Zero-Day: Two in-the-wild 0-days patched by Chrome: CVE-2021-38000 and CVE-2021-38003. Both discovered by Goo… twitter.com/i/web/status/1… 2021-10-29 06:14:25
Twitter Icon @kr_simon_choi Google is aware that exploits for CVE-2021-38000 and CVE-2021-38003 exist in the wild 2021-10-29 07:48:20
Twitter Icon @cert_ist Google a publié la version 95.0.4638.69 de Chrome qui corrige deux vulnérabilités zero-day (CVE-2021-38000 et CVE-2… twitter.com/i/web/status/1… 2021-10-29 08:07:42
Twitter Icon @LaneSystems #Google fixes two high-severity #ZeroDay flaws in #Chrome zdnet.com/article/google… CVE-2021-38000 & CVE-2021-38003.… twitter.com/i/web/status/1… 2021-10-29 11:10:11
Twitter Icon @AttackerKb CVE-2021-38003, CVE-2021-38000, and CVE-2021-42258 have been reported as exploited in the wild. attackerkb.com/activity-feed 2021-10-29 14:26:50
Twitter Icon @z3r0trust Consider updating Chrome today if you use it. "Google is aware that exploits for CVE-2021-38000 and CVE-2021-38003… twitter.com/i/web/status/1… 2021-10-29 15:34:38
Twitter Icon @appletester_rus CVE-2021-38000 and CVE-2021-38003. The first of these, CVE-2021-38000, is described as "Insufficient verification o… twitter.com/i/web/status/1… 2021-10-29 18:22:20
Twitter Icon @appletesterrus CVE-2021-38000 and CVE-2021-38003. The first of these, CVE-2021-38000, is described as "Insufficient verification o… twitter.com/i/web/status/1… 2021-10-29 18:22:51
Twitter Icon @v_intestine Edge の Stable 版で 95.0.1020.40 がリリースされました。 "This update contains a fix for CVE-2021-38000 and CVE-2021-38003 which… twitter.com/i/web/status/1… 2021-10-30 04:44:12
Twitter Icon @rkx73 #CVE-2021-38000 y #CVE-2021-38003 Dos vulnerabilidades día cero en #GoogleChrome noticiasseguridad.com/vulnerabilidad… 2021-10-30 06:48:37
Twitter Icon @Mamo23549442 أطلقت شركة Google الاسبوع الماضى تحديثآ أمنيا ل Google Chrome و ذلك لى اصلاح ثغرتين Zero Day و هم CVE-2021-38000 و… twitter.com/i/web/status/1… 2021-10-31 18:17:36
Twitter Icon @nerccu Microsoft Edge (Chromium-based) Security Advisory #Microsoft is aware that exploits for CVE-2021-38000 and CVE-202… twitter.com/i/web/status/1… 2021-11-02 06:35:42
Twitter Icon @ipssignatures The vuln CVE-2021-38000 has a tweet created 0 days ago and retweeted 11 times. twitter.com/nerccu/status/… #pow1rtrtwwcve 2021-11-02 10:06:01
Twitter Icon @linguini_elruso RCE en chrome 95.0.4638.69 y anteriores CVE-2021-38000 CVE-2021-38003 Entre $5k-$25k, que la casería empiece ? Y… twitter.com/i/web/status/1… 2021-11-05 16:30:51
Twitter Icon @CVEreport CVE-2021-38000 : Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.46… twitter.com/i/web/status/1… 2021-11-23 21:33:58
Reddit Logo Icon /r/k12cybersecurity MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution 2021-11-01 13:16:00
© CVE.report 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report