New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 629674 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner: ----
Closed: Jul 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: 2
Type: Bug-Security



Sign in to add a comment

Security: Executing JavaScript through bookmarks bar

Reported by smartmoo...@gmail.com, Jul 19 2016

Issue description

Hi , I would like to report a security issue within bookmarks. 
The problem exists because `javascript:` URIs are allowed in bookmarks.

## Reproduce: 
1.Create a new bookmark in the bookmarks bar folder and add `javascript:alert(1);` as the url 
2. Go too google.com , the click the bookmark you have created.

Also, Clicking the bookmark which has `javascript:` url bypasses CSP , for example if a site has a CSP rule such as `script-src 'self' ` , JavaScript shouldn't be allowed to be executed through `javascript:` URIs , however through this bug it will be executed.

The impact is not only bypassing CSP , it can be a more dangerous issue which requires some user interaction (The user will have to enter the XSS payload himself). 

## Scenario: 
Attacker has a website named "theEvilSite.com" , Attacker tells users' to add his site to their bookmark by clicking some link that will copy "javascript:[XSS_Payload]//some_long_path_so_victims_don't_notice" to the victim's payload then copying it to the URL field in the new bookmark form, the victim believes that nothing harmful can be done through bookmarks so he actually does as what the attacker says and copies the link and adds the bookmark. Victim goes to `gmail.com` , then he decides to see "theEvilSite.com" , so he clicks the bookmarks link. The malicious JavaScript payload gets executed. 


VERSION
Chrome Version: Version 51.0.2704.106 m (64-bit) + stable
Operating System: Windows 10 64-bit
 
Cc: jww@chromium.org mkwst@chromium.org jochen@chromium.org
Components: UI>Browser>Bookmarks
Labels: Security_Severity-Low Security_Impact-Stable M-54 Pri-2
Status: Available (was: Unconfirmed)
I verified this, and it does seem concerning that clicking a bookmark results in a dialog attributed to www.google.com with some arbitrary contents. However, assigning priority as low for now because this requires so much user interaction.

jww@chromium.org, jochen@chromium.org, or mkwst@chromium.org, can you take a look at this, or is there a more appropriate person to do so?

Comment 2 by tsepez@chromium.org, Jul 20 2016

Status: WontFix (was: Available)
See https://en.wikipedia.org/wiki/Bookmarklet , this is intentional and is not a security isusue.
oh , yes looks like it's intentional. 
What about that this bypasses CSP ? it doesn't happen in other browsers 

Comment 4 by mkwst@chromium.org, Jul 20 2016

re #3: https://w3c.github.io/webappsec-csp/#extensions

Basically, browser features like extensions and bookmarklets ought to bypass a page's policy. That they don't in other browsers is, IMO, a bug in those browsers.

Comment 5 by wfh@chromium.org, Jul 20 2016

Labels: -Restrict-View-SecurityTeam -Security_Severity-Low -Security_Impact-Stable
Project Member

Comment 6 by sheriffbot@chromium.org, Oct 27 2016

Labels: allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment