New issue
Advanced search Search tips

Issue 595905 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner:
Closed: Mar 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug



Sign in to add a comment

Download Protection Bypass: Land a blacklisted download using Chrome on Windows (crdownload method)

Reported by jaggeds...@gmail.com, Mar 17 2016

Issue description

VERSION
Chrome Version: 50.0.2661.18 dev-m
Operating System: [Windows 7 Home SP1]

REPRODUCTION CASE
Download Protection Bypass - Chrome on Windows 7
Land a blacklisted test binary on disk, using Chrome. We are able to use an allowed executable file to download and run potentially dangerous unwanted software.
Bug: Blocked downloads are still written to disk until "Dismiss" is clicked.
This is unnecessary, because the user has no other choice except for "Learn More." Instead, the file should be deleted as soon as it's determined to be unwanted software. This proof of concept will take advantage of this and demonstrate using Chrome to install unwanted software.

Process: User downloads our executable file and runs it. This file triggers an unwanted download in Chrome, resulting in a crdownload file being created in your downloads folder.
After this file has been created, program will simply rename it from .crdownload to .exe and run it. The user will see that a download was blocked, but what they are unaware of is that an unwanted application was installed in the background.


For demonstration purposes, this program will download a sample "potentially unwanted app" (located at http://testsafebrowsing.appspot.com/s/pua.exe)
Then we will search the latest *.crdownload from the downloads folder and rename it to .exe and run it. Congratulations, you now have malware! Just kidding.

See attached c++ source, also uploaded the binary if it helps.
Chrome must be set as the default browser, and use the default downloads directory. However, these requirements can be eliminated with extra work.

I have downloaded the executable (concept.exe) from the public internet with Chrome and it wasn't blocked. All I had to do was run it
Please let me know if you have any problems or questions

Thank You!
Jon Eyrick
jaggedsoft@gmail.com

 
concept.cpp
2.8 KB View Download
concept.exe
75.2 KB Download
Safe to run, doesn't install anything or run the payload. Just a demonstration
Labels: -Restrict-View-Google
Status: WontFix (was: New)
Thanks for the report!

The .crdownload temporary file is intentionally kept since it's possible the user would want to recover it from the chrome://downloads UI.  This is a feature, and WAI.

The renaming you do in concept.cpp requires a second executable to be download and run, which is out of scope of the VRP program.
Hi, thank you for the quick response!

If we can accomplish the same process from a Chrome Extension, resulting in a blacklisted download landed on disk, will it qualify?
Also, if we have an exe file that is allowed to be downloaded through Chrome (not blocked) that can change Chrome's homepage, would this be eligible? Thank you
For #3: If you have a by-pass method that meets the posted VRP criteria and uses a common extension, please do submit it (separate bug).  A custom extension would likely not qualify, since it would be flagged separately as a policy violation.

for #4: No, an exe's behaviour is not a criterion for the VRP.
Thanks and I hope you enjoy the rest of your day

You say an exe's behavior is not a criteria, but it indicates on this page that it is. https://www.google.com/about/appsecurity/chrome-rewards/index.html#rewards That's why I chose to submit this.

You should change some wording on that page:
"Any gestures required must be likely and reasonable for most users. As a guide, execution with more than three reasonable user gestures (eg: click to download, open .zip, launch .exe) is unlikely to qualify, but it’ll be judged on a case-by-case basis. The user can’t be expected to bypass warnings."

Thanks again!
To be clear, the behaviour of the executable once running isn't a criteria.  Doesn't matter if it changes your homepage, or plays tetris.
Thanks for all of your time. I am trying to understand this for my next submission. Which criteria did I not meet?
The end user must only click to download and run the exe and a blacklisted executable is landed. It includes binaries in the criteria below. My submission appears to meet the following criteria:


Q: Can I have more details about the Download Protection bypass rewards?

A: Sure! Here are all of the qualifying rules you need to consider:

Safe Browsing must be enabled on Chrome and have an up-to-date database (this may take up to a few hours after a new Chrome install).
Safe Browsing servers must be reachable on the network.
Binary must land in a location a user is likely to execute it (e.g. Downloads folder).
The user can’t be asked to change the file extension or recover it from the blocked download list.
Any gestures required must be likely and reasonable for most users. As a guide, execution with more than three reasonable user gestures (eg: click to download, open .zip, launch .exe) is unlikely to qualify, but it’ll be judged on a case-by-case basis. The user can’t be expected to bypass warnings.
The download should not send a Download Protection Ping back to Safe Browsing. Download Protection Pings can be measured by checking increments to counters at chrome://histograms/SBClientDownload.CheckDownloadStats. If a counter increments, a check was successfully sent (with exception to counter #7, which counts checks that were not sent).
The binary’s hosting domain and any signature can not be on a whitelist. You can measure this by checking chrome://histograms/SBClientDownload.SignedOrWhitelistedDownload does not increment.
Since your exmaple requires the user to download and run your concept.exe, I assume that would generate a Download Protection Ping (you can verify).  So that would be seen by Safe Browsing, and thus it doesn't not qualify for the VRP.  Your example also requires two downloads -- one for the blacklisted file, and one for the not-yet blacklisted file.
Labels: Type-Bug

Comment 11 by vakh@chromium.org, Mar 10 2017

Labels: Restrict-View-SecurityTeam
For all Download Protection VRP bugs: removing label Restrict-View-Google and adding Restrict-View-SecurityTeam instead.
Project Member

Comment 12 by sheriffbot@chromium.org, Mar 11 2017

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment