New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 696446 link

Starred by 3 users

Issue metadata

Status: Fixed
Owner:
Closed: May 2018
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux , Android , Windows , Chrome , Mac , Fuchsia
Pri: 3
Type: Feature

Blocked on:
issue 811558



Sign in to add a comment

Security: filesystem URLs Spoofing

Reported by xis...@gmail.com, Feb 27 2017

Issue description

VULNERABILITY DETAILS
When input the following url in address bar filesystem:http://www.hackevil.com@www.example.com, the chrome will display the whole url。
The string in front of "@" may allow a remote attacker to carry out phishing style attacks.

VERSION
Chrome Version:56.0.2924.87 (64-bit)[Stable]
Operating System: Windows7/10

Online Demo: https://jsfiddle.net/xisigr/70Lwst5m/ .Please click "click me" button.


 
url1.png
43.2 KB View Download
Cc: kerrnel@chromium.org est...@chromium.org
Owner: est...@chromium.org
Status: Assigned (was: Unconfirmed)
Thanks for the report. I understand why seeing, for example, "chromereleases.googleblog.com" in the address bar is not ideal, but there are a few mitigating factors here. First, Chrome indicates that it is a filesystem connection and not a security connection. Secondly, unless you already possess to ability to put arbitrary content onto the users filesystem, they will most likely see an error or some useless content. 

estark@ what do you think?

Comment 2 by xis...@gmail.com, Feb 27 2017

Please open it in chrome normal mode. Because filesystem is disable in incognito mode.
Cc: emilyschechter@chromium.org mea...@chromium.org
Components: UI>Security>UrlFormatting
Labels: -Type-Bug-Security -Restrict-View-SecurityTeam Pri-3 Type-Feature
Owner: ----
Status: Available (was: Assigned)
Thanks, I opened it in normal mode. I don't think there is a security vulnerability here, as it does show that it is a filesystem URL. That being said, we should track this as a feature bug because it brings to mind a few options that could make these dialogs easier to understand for our users:

1) Adding the not secure badge to filesystem URLs
2) Hiding the untrusted part of the URL

Comment 4 by mea...@chromium.org, Feb 27 2017

We are aware of the spoofing risks posed by pseudo URLs such as filesystem. Please see  bug 594215 .

I agree in this particular case we should probably have dropped the part before @, but I think it's better to solve the problem by doing something more substantial instead (e.g. block navigations to these urls, or simply drop the filesystem scheme and show origin instead or some such)

Comment 5 by est...@chromium.org, Nov 10 2017

Labels: Hotlist-EnamelAndFriendsFixIt

Comment 6 by est...@chromium.org, Feb 18 2018

Labels: -Hotlist-EnamelAndFriendsFixIt
This may have gotten fixed by  Issue 809062 .

Comment 8 by mea...@chromium.org, Apr 27 2018

 Issue 809062  has been merged into this issue.

Comment 9 by mea...@chromium.org, Apr 27 2018

Blockedon: 811558
Labels: Team-Security-UX Security_Impact-Stable Security_Severity-Medium OS-Android OS-Chrome OS-Fuchsia OS-Linux OS-Mac OS-Windows
Owner: mea...@chromium.org
Status: Assigned (was: Available)
 Bug 809062  is a duplicate of this one and we decided it's a medium severity security bug, so adding back the labels here. The fix will be  bug 811558 .
Status: Fixed (was: Assigned)
Fixed by  bug 811558 .

Comment 11 by xis...@gmail.com, May 14 2018

Hi meacer, is this bug possible to get a reward and CVE number?
Labels: reward-topanel
Commit 54400200 initially landed in 68.0.3416.0
Labels: -reward-topanel -Security_Severity-Medium Security_Severity-Low reward-0
I'm afraid the VRP panel declined to reward for this bug. Many thanks for the report. It will get a CVE when Chrome 68 goes stable.
Labels: Release-0-M68 CVE-2018-17460

Sign in to add a comment