New issue
Advanced search Search tips

Issue 621518 link

Starred by 1 user

Issue metadata

Status: Duplicate
Merged: issue 260159
Owner: ----
Closed: Jun 2016
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug-Security



Sign in to add a comment

Security: A Chrome browser tab of the XSS vulnerability

Reported by xiaopig...@gmail.com, Jun 20 2016

Issue description

This template is ONLY for reporting security bugs. If you are reporting a
Download Protection Bypass bug, please use the "Security - Download
Protection" template. For all other reports, please use a different
template.

Please see the following link for instructions on filing security bugs:
http://www.chromium.org/Home/chromium-security/reporting-security-bugs


VULNERABILITY DETAILS
Please provide a brief explanation of the security issue.

In the collection of Web tags in the web site inside the input javascript:alert (location.href); void (0), when each click will pop up the window. I think it is going to fix this bug, because it does not rule out one day someone to use this vulnerability to carry out remote command execution. First, the means of attack will be to let you collect a pornographic web site of the label, if the user clicks. Then you will get some information about the user.

VERSION
Chrome Version: 51.0.2704.103 m
Operating System: [Please indicate OS, version, and service pack level]

REPRODUCTION CASE
Please include a demonstration of the security bug, such as an attached
HTML or binary file that reproduces the bug when loaded in Chrome. PLEASE
make the file as small as possible and remove any content not required to
demonstrate the bug.

FOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION
Type of crash: [tab, browser, etc.]
Crash State: [see link above: stack trace, registers, exception record]
Client ID (if relevant): [see link above]

 
pig.rar
306 KB Download

Comment 1 by est...@chromium.org, Jun 20 2016

Labels: -Restrict-View-SecurityTeam
Mergedinto: 260159
Status: Duplicate (was: Unconfirmed)
Hi, thanks for the report! This is an intentionally supported feature called a bookmarklet, which we don't consider a security vulnerability because a user would have to choose to install it and run it in order to be exploited. For some background on this, please see issues  476545 ,  266410 ,  570026 .
Project Member

Comment 2 by sheriffbot@chromium.org, Oct 1 2016

This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 3 by sheriffbot@chromium.org, Oct 2 2016

This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Labels: allpublic

Sign in to add a comment