Google published an advisory for a use-after-free in the Chrome implementation of the FileReader API (CVE 2019-5786). The exploit leads to code execution in the Renderer process, and was used to fully compromise the host system.
Key Pointers:
- Understanding the severity and the scope of impact
- Understanding how the exploit works for the vulnerability
- Covering the prerequisites for preparing the setup
- Exploit demonstration for Google Chrome
- Mitigations for preventing such attacks