Security: Chrome XSS Auditor bypass on iOS
Reported by
xiaopig...@gmail.com,
Dec 27 2016
|
||||||
Issue descriptionVULNERABILITY DETAILS VERSION Chrome Version: 54.0.2840.91 Operating System: iOS REPRODUCTION CASE Create the xss_js file: <script>var q=""</script> 1.in and unicode escapes, i can bypass what is called i\u006E. Modern browsers, but you must disable the escape of words with Unicode escape, and the Safari browser is not forbidden to be processed in the same way. PoC: https://vulnerabledoma.in/xss_js?q=%22i\u006E+alert(1)// Then it becomes:<script>var q=""i\u006E alert(1)//"</script> 2. XSS filter, in addition to the string in the XSS, XSS simple reflection text also tried to stop you want. In my past articles, so we introduce a string part of a string into the case of being cut off, and then paste in the following. SecurityCamp2015 "Getting Started" from the Kinugawa Masato: http: //www.slideshare.net/masatokinugawa/ss-51723687 I think this time is concerned about the valueOf = Of course, if the previously defined function, in the following format, can function as a call instead of using a filter to react (). Specific reference to the article: http://masatokinugawa.l0.cm/2016/12/xss11.html http://masatokinugawa.l0.cm/2016/12/xss10.html
,
Dec 28 2016
I sent this question to security@google.com, they said to report here. I do not know why
,
Dec 29 2016
Passing to tsepez to triage.
,
Dec 29 2016
,
Dec 31 2016
,
Jan 3 2017
what
,
Jan 3 2017
We don't usually treat XSS auditor bypasses as security bugs for the reasons mentioned in c#1, but leaving this open for tsepez to take a look. I'm not sure that we actually have an XSS auditor on iOS or if there's anything actionable here since our development is done in Blink, but iOS uses WebKit.
,
Jan 3 2017
XSSAuditor is part of the underlying webview, and we don't have control over it on iOS. If this reproduces on another platform, then I can take a look at it.
,
Jan 3 2017
In addition, this looks to be an injection into the middle of a pre-existing script block, eg. the |var q="| portion of the page wasn't a reflection. XSSAuditor can't cover this case, either.
,
Jan 4 2017
I went to test to see if you can see on the Android system implementation? |
||||||
►
Sign in to add a comment |
||||||
Comment 1 by elawrence@chromium.org
, Dec 28 2016Summary: Security: Chrome XSS Auditor bypass on iOS (was: Security: Chrome byxss on iOS)