It wasn't a particularly likely exploitation route... The user had to already be double-clicking files they'd downloaded from a malicious webpage. At that point, it might as well have been an .exe file.
And after all that, all it can do is run a search query. It can't leak all your Gmail emails or exploit the local machine.
> And after all that, all it can do is run a search query. It can't leak all your Gmail emails or exploit the local machine.
Doesn't that contradict the following?
> “However, because the IPC channel was exposed to JS directly in New Tab page, the XSS in Chrome’s NTP can be treated as the equivalent of renderer process RCE.”
And after all that, all it can do is run a search query. It can't leak all your Gmail emails or exploit the local machine.