Google patches Chrome vulnerability used for account takeover and MFA bypass
Briefly

Chrome uniquely resolves Link headers for subresource requests, which can lead to security vulnerabilities. Link headers are crucial for preloading important resources and enhancing response times. However, when Chrome transmits the URL for these resources, it may inadvertently include sensitive information, particularly regarding referrer-policy settings that dictate what data is shared with third-party servers. This raises concerns about the security of OAuth flows and other sensitive authentication data, challenging the browser's traditional security protocols.
Unlike other browsers, Chrome resolves the Link header on subresource requests. The problem lies in the potential exposure of sensitive data via referrer-policy.
Link headers inform browsers about important resources to preload, enhancing speed. However, Chrome's handling of these headers risks transmitting sensitive information, complicating security.
Read at CSO Online
[
|
]