Google publishes exploit code before patch, reported 29 months earlier, is fixed.
See full article...
See full article...
No, it's beyond the time that the multi-trillion dollar company should have fixed their shit.29 month is still responsible disclosure. The bad guys may have known about this vulnerability for 29 months, it's time we tell the good guys about it.
Depending on the browser, the connections either reopen or remain open even after it or the device running it has rebooted.
Google isn't monolithic. It's entirely possible that the exploit post was the result of internal political infighting between Google's security and Chrome teams.Hold on, hold on....Google just published a PoC exploit that demonstrates a compromise of one of its own products? What's the expectation here...that if Google pushes the exploit it'll light a fire under Google to fix this Google code because previously Google was ignoring the findings from Google? Do I have that right?
I shall assume AI is partially to blame for the publication unless they assure us it isn't, at which time I will assume AI is wholly responsible.Dan Goodin said:Google representatives didn’t immediately respond to an email asking how and why it published the vulnerability and if or when a fix would become available.
Sounds like it was a mistake to make the issue public; once attention was drawn to it, they made it private again. Dan linked to the conversation here: https://infosec.exchange/@rebane2001/116606719764376414Hold on, hold on....Google just published a PoC exploit that demonstrates a compromise of one of its own products? What's the expectation here...that if Google pushes the exploit it'll light a fire under Google to fix this Google code because previously Google was ignoring the findings from Google? Do I have that right?
It's Googles ... all the way down.Hold on, hold on....Google just published a PoC exploit that demonstrates a compromise of one of its own products? What's the expectation here...that if Google pushes the exploit it'll light a fire under Google to fix this Google code because previously Google was ignoring the findings from Google? Do I have that right?
It could also be someone's resignation statement.I shall assume AI is partially to blame for the publication unless they assure us it isn't, at which time I will assume AI is wholly responsible.
What the actual fuck? Nobody thought this could lead to more problems than usefulness?Depending on the browser, the connections either reopen or remain open even after it or the device running it has rebooted.
Firefox?Hey cool article, when I opened up Vivaldi this morning the download tab opened but was empty. Given that
Is there any reliable way to unfuck my browser? I have rebooted the computer, but I did see the download window open at least twice between yesterday and today.
come on we all know the answer to this in this post Patriot act world.I thought Google had a 90 day policy on publishing these things; interesting to know why this got an extra 26 months.
I don’t think the patch was reported 29 months ago and hopefully that patch won’t need to be fixed once it is (finally) released.before patch, reported 29 months earlier, is fixed
Only if they can get thousands if not millions of users to browse to their bad web site. That seems a bit of a hurdle.Nonetheless, the exploit could allow an attacker to wrangle thousands, possibly millions, of devices into a network.
You seem to underestimate the willingness and ability of bad actors to exploit the most common browser engine in the world (now that a know exploit is available to them). I would prefer that they don't get handed the keys to the castle, even if there is a moat in front of it.Only if they can get thousands if not millions of users to browse to their bad web site. That seems a bit of a hurdle.
yeah, i let them know, hope they fix it soon (or at least faster than the chrome bug)Lyra's pronouns are she/her, please issue correction
It's not the case here, but Project Zero, Google's red team, routinely publishes vulnerabilities impacting Google services or products that haven't been patched yet (in particular Android has been hit several times). In fact this recent blog post mentions that a recent bug was the first one this team member had that was actually patched before their 90 day disclosure window https://projectzero.google/2026/05/pixel-10-exploit.htmlGoogle isn't monolithic. It's entirely possible that the exploit post was the result of internal political infighting between Google's security and Chrome teams.
Can you share the script?a twice-a-day script on every device I own.
Just needs more Alphabet soup.Hold on, hold on....Google just published a PoC exploit that demonstrates a compromise of one of its own products? What's the expectation here...that if Google pushes the exploit it'll light a fire under Google to fix this Google code because previously Google was ignoring the findings from Google? Do I have that right?
Other browsers Rebans confirmed as vulnerable include Brave, Opera, Vivaldi, and Arc. Both Firefox and Safari are unaffected because they don’t support the browser-fetching feature.
Hello and welcome to our neighborhood BTW!yeah, i let them know, hope they fix it soon (or at least faster than the chrome bug)
It can’t access the computer, but it could cause it to load a pdf or image that exploits a vulnerable parser to escape the browser sandbox and run code that could access the computer."less experienced users are likely to consider the behavior the result of a nuisance bug and have no idea their device is compromised"
Rebane says it can't access your computer. So how can your device be compromised?
I am so, so sorry, Lyra.yeah, i let them know, hope they fix it soon (or at least faster than the chrome bug)
Doesn't deprecate mean "not encouraged to use", so it would still be there (unfixed)?Apparently Google knew that this API was little-used and hard to maintain, and had decided to deprecate it late last year before being talked out of it:
https://groups.google.com/a/chromium.org/g/blink-dev/c/CpXXaJh5Rq8
I wonder if they never fixed the bug because they intended to deprecate & remove, but then didn't re-prioritize it when the decision was made to keep the API?
And just as more and more websites work properly only on Chrom{e,ium}.Maybe we can get more people away from Chromium browsers now. Firefox is a great alternative.
Deprecation is often a prelude to removal of a feature.Doesn't deprecate mean "not encouraged to use", so it would still be there (unfixed)?
Since its reporting 29 months ago, the vulnerability remained unknown except to Chromium developers.