Issue metadata
Sign in to add a comment
|
JavaScript Key Filtering Vulnerability
Reported by
mishra.d...@gmail.com,
Feb 14 2017
|
||||||||||||||||||
Issue descriptionUserAgent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:54.0) Gecko/20100101 Firefox/54.0 Steps to reproduce the problem: Works for me in Chrome : Stable in Win 7 1. Open hide.html What is the expected behavior? What went wrong? Multiple web browsers are prone to a JavaScript key-filtering vulnerability because the browsers fail to securely handle keystroke input from users. This issue is demonstrated to allow attackers to divert keystrokes from one input form in a webpage to a hidden file-upload dialog in the same page. This may allow remote attackers to initiate file uploads from unsuspecting users. Other attacks may also be possible. Exploiting this issue requires that users manually type the full path of files that attackers wish to download. This may require substantial typing from targeted users, so attackers will likely use keyboard-based games, blogs, or other similar pages to entice users to enter the required keyboard input to exploit this issue. Did this work before? N/A Chrome version: 56.0.2924.87 (Official Build) (64-bit) Channel: stable OS Version: 6.1 (Windows 7, Windows Server 2008 R2) Flash Version: Shockwave Flash 24.0 r0
,
Feb 14 2017
Public Disclosure from 2007 - http://www.securityfocus.com/bid/26669/discuss Please do not file vulnerabilities that are not reproducible in Chrome. Please do not copy/paste vulnerabilities and descriptions from public sources without making clear that you have done so.
,
Feb 14 2017
Nope, after reading the comment and searching I found security focus has the cve id for the similar issue. I wasn't aware that this is an 2006 bug and already reported or I would have submitted it by giving a reference by upstream bug id from chromium if I would have found.
,
Feb 14 2017
Your report includes verbatim strings copied from the 2007 Security Focus page. |
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by elawrence@chromium.org
, Feb 14 2017