New issue
Advanced search Search tips

Issue 660103 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner: ----
Closed: Oct 2016
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug



Sign in to add a comment

Chrome user can unknowingly become part of DDOS attack by clicking link of HTML file

Reported by cs.anura...@gmail.com, Oct 27 2016

Issue description

VULNERABILITY DETAILS
On clicking a hyperlink for twitter.com, user expects the browser to move to twitter.com. Now browser only make one call to twitter.com when user clicks on the link. With this trick, when user clicks on the link, chrome will hit twitter 22 times instead of 1 time (can be increased easily to hundreds, but did not wanted to get my ip blacklisted:) ) and post that chrome will finally redirect to twitter.com
User wont notice anything malicious here and would unknowingly be sending large amount of traffic from his computer network. No new tab will open in this attack so that user wont be able to identify the attack.

VERSION
Chrome Version: 54.0.2840.71 m (64-bit)
Operating System: Windows 10

REPRODUCTION CASE
1) Use a HTTP intercepter like Burp to record network logs
2) Open the attached Chrome.html
3) Click on Open Twitter
4) Twitter will open but if you check your network logs in burp you will see Chrome called twitter 22 times instead of once (22 can be increased to very large value by extending number of iframe in the script)

Note:
This problem does not occur in Firefox because Firefox did not waited for the script to complete and instead moved to twitter.com instantly hence saving the user from the attack.

 
chrome.html
1.3 KB View Download
Labels: -Type-Bug-Security -Restrict-View-SecurityTeam Type-Bug
Summary: Chrome user can unknowingly become part of DDOS attack by clicking link of HTML file (was: Security: Chrome user can unknowingly become part of DDOS attack by clicking link of HTML file)
The ability of the browser to make an arbitrary number of well-formed HTTP(S) requests to any number of targets is "Working as Intended" behavior. Such requests can be made in any number of ways, including concealed IFRAMEs, IMG elements, etc. This is true across all browsers, especially any browser that supports JavaScript, although script is not strictly required for such an attack.
Status: WontFix (was: Unconfirmed)

Comment 3 Deleted

Sign in to add a comment