Particle.news
Download on the App Store

Public 'Brash' Exploit Crashes Chromium Browsers in Seconds After Researcher Flags Unpatched Blink Flaw

The PoC abuses missing rate limits on document.title to flood the UI thread, with tests confirming rapid crashes across Chromium-based browsers.

Overview

  • Researcher Jose Pino published the Brash proof‑of‑concept after notifying the Chromium team in late August and later detailing the exploit on GitHub.
  • Google said it is looking into the issue and Brave said it will adopt a Chromium fix when available, while most other vendors did not provide public responses.
  • Independent tests on Windows, macOS, Linux, and Android collapsed Chromium‑based browsers in roughly 15–60 seconds, with some runs freezing the host and draining large amounts of RAM.
  • The attack floods unthrottled document.title updates to generate millions of DOM mutations per second, which can be triggered by visiting a single crafted URL.
  • Firefox and Safari, including all iOS browsers using WebKit, were immune in tests, and coverage differs on the exact affected Chromium versions as potential exposure spans billions of users.