Issue metadata
Sign in to add a comment
|
I see a warning in the DevTools about "Self-xss"?
Reported by
cmarkta...@gmail.com,
Nov 1 2016
|
||||||||||||||||||
Issue descriptionVULNERABILITY DETAILS I received a warning on my console that my google account was prone to an attack called self xss. I noticed that my google account has this ?utm_source=OGB&pli=1 This facebook app can compromise a user's facebook account. VERSION Chrome Version: [54.0.2840.71 64bit] + [stable, beta, or dev] Operating System: [Windows7 64bit] REPRODUCTION CASE https://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&cad=rja&uact=8&ved=0ahUKEwiqlbXjmIbQAhWqJ8AKHXemCbMQFggpMAM&url=http%3A%2F%2Fwww.smartapproach.n.nu%2F&usg=AFQjCNGkJxwYj5MzVEu75QegIovJY6p64A&sig2=7jAWuH-fdW-LlMgMKArFmQ https://staticxx.facebook.com/connect/xd_arbiter/r/fTmIQU3LxvB.js?version=42# https://www.facebook.com/l.php?u=http%3A%2F%2Fon.fb.me%2F1mXNHhm&h=6AQFDyZra&s=1 redirects to another site http://on.fb.me/1mXNHhm
,
Nov 1 2016
I'm not sure I understand the problem. http://on.fb.me/1mXNHhm redirecting to a facebook webpage seems correct to me. Could you elaborate more about self xss? Thanks.
,
Nov 1 2016
,
Nov 1 2016
Allow me to improve my report. Cross-origin attacks work by using CSS style sheets from vulnerable pages and extracting sensitive information from these pages in the form of css property attributes. Reproduction Cases: 1.http://www.smartapproach.n.nu/ it shows an error refused to display there was a link on indicated it is the url below. 2.https://www.facebook.com/l.php?u=http%3A%2F%2Fon.fb.me%2F1mXNHhm&h=6AQFDyZra&s=1 This means that I followed a link in facebook that redirects me to another site 3.http://on.fb.me/1mXNHhm This is another vulnerability I noticed that there was an error on my console. I discovered that google accounts are vulnerable to self xss. Self Xss is a social engineering attack used to gain control of victim's web accounts in a self xss attack, the victim of the attack accidentally runs malicious code on his/her web browser, thus exposing it to attacker. https://myaccount.google.com/?pli=1
,
Nov 1 2016
This is working as intended. The Website is warning the user that they may be tricked into doing something dangerous if they're using the Console, as the developer tools console allows the user to execute dangerous script that exposes the content of the page to another site.
,
Feb 8 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by cmarkta...@gmail.com
, Nov 1 2016153 KB
153 KB View Download