New issue
Advanced search Search tips

Issue 677063 link

Starred by 2 users

Issue metadata

Status: WontFix
Owner:
Closed: Jan 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: iOS
Pri: ----
Type: Bug



Sign in to add a comment

Security: Chrome XSS Auditor bypass on iOS

Reported by xiaopig...@gmail.com, Dec 27 2016

Issue description

VULNERABILITY DETAILS

VERSION
Chrome Version: 54.0.2840.91
Operating System: iOS

REPRODUCTION CASE
Create the xss_js file:
<script>var q=""</script>

1.in and unicode escapes, i can bypass what is called i\u006E.

Modern browsers, but you must disable the escape of words with Unicode escape, and the Safari browser is not forbidden to be processed in the same way.

PoC: https://vulnerabledoma.in/xss_js?q=%22i\u006E+alert(1)//

Then it becomes:<script>var q=""i\u006E alert(1)//"</script>

2. XSS filter, in addition to the string in the XSS, XSS simple reflection text also tried to stop you want. In my past articles, so we introduce a string part of a string into the case of being cut off, and then paste in the following.

SecurityCamp2015 "Getting Started" from the Kinugawa Masato: http: //www.slideshare.net/masatokinugawa/ss-51723687

I think this time is concerned about the valueOf =

Of course, if the previously defined function, in the following format, can function as a call instead of using a filter to react ().


Specific reference to the article:
http://masatokinugawa.l0.cm/2016/12/xss11.html
http://masatokinugawa.l0.cm/2016/12/xss10.html


 
Components: Blink>SecurityFeature
Summary: Security: Chrome XSS Auditor bypass on iOS (was: Security: Chrome byxss on iOS)
I'm not entirely clear on the scope of what's being reported here? Is this just a claim of a bypass of the XSS Auditor, or is there another claim as well?

https://dev.chromium.org/Home/chromium-security/security-faq#TOC-Are-XSS-filter-bypasses-considered-security-bugs-
I sent this question to security@google.com, they said to report here. I do not know why

Comment 3 by palmer@chromium.org, Dec 29 2016

Labels: OS-iOS
Owner: tsepez@chromium.org
Passing to tsepez to triage.
Project Member

Comment 4 by sheriffbot@chromium.org, Dec 29 2016

Status: Assigned (was: Unconfirmed)

Comment 5 by kenrb@chromium.org, Dec 31 2016

Labels: Needs-Feedback
what
Components: Security
Labels: -Type-Bug-Security -Restrict-View-SecurityTeam -Needs-Feedback Type-Bug
We don't usually treat XSS auditor bypasses as security bugs for the reasons mentioned in c#1, but leaving this open for tsepez to take a look. I'm not sure that we actually have an XSS auditor on iOS or if there's anything actionable here since our development is done in Blink, but iOS uses WebKit.
Status: WontFix (was: Assigned)
XSSAuditor is part of the underlying webview, and we don't have control over it on iOS.  If this reproduces on another platform, then I can take a look at it.
In addition, this looks to be an injection into the middle of a pre-existing script block, eg. the |var q="| portion  of the page wasn't a reflection.  XSSAuditor can't cover this case, either.
I went to test to see if you can see on the Android system implementation?

Sign in to add a comment