New issue
Advanced search Search tips

Issue 708506 link

Starred by 2 users

Issue metadata

Status: Duplicate
Merged: issue 648350
Owner: ----
Closed: Apr 2017
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows
Pri: 2
Type: Bug-Security



Sign in to add a comment

Spoofing via overlaid windows and form validation bubbles

Reported by jm.acun...@gmail.com, Apr 5 2017

Issue description

UserAgent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36

Steps to reproduce the problem:
Observing the bug with id 673163 (https://bugs.chromium.org/p/chromium/issues/detail?id=673163) I wanted to go a little deeper.

1- With IE11 the spoof is total, pity that Microsoft has closed the rewards program for this browser.

Example: http://createcharts.esy.es/bubbles-spoof-ie11.html

2- In Google Chrome Version 57.0.2987.133, you can also fool a user.
In this case, it is about opening a window and minimizing it (only the web address is shown).
I then replace the contents of the main page with the one of the open window.

Example: http://createcharts.esy.es/bubbles-spoof.html

3- Mozilla Firefox in its latest version, has resolved this bug by putting the focus in the window that validates the form.

What is the expected behavior?

What went wrong?
Content spoofing on any website

Did this work before? N/A 

Chrome version: 57.0.2987.133  Channel: stable
OS Version: 6.3
Flash Version:
 
Demo (video attach)
bubble-spoof.webm
4.9 MB View Download
Demo IE11 (video attach)
bubble-spoof-ie11.webm
3.4 MB View Download
Components: UI>Browser
This doesn't seem to repro in Chrome 59; the window that shows the validation bubble indeed gets focus each time the bubble is shown.

Having said that, it's not really clear to me how the form validation bubble itself is the interesting part of this attack ... The HTML markup in the createhart.esy.es page (which pretends to be a Google doc) could easily paint any warnings it wants without using notifications at all. 

The "spoof" here is that the user could be confused by the contents of the short window's omnibox that is position over top of the background window's omnibox.
I think my approach is correct.
And what is exposed in Comment 3 is also.

I can think of several scenarios:

- Show a page similar to the google store (https://store.google.com)
- When you click on an item, the user is redirected to a paypal page where the entry will be made to my account.
Example with Paypal:

http://createcharts.esy.es/bubbles-spoof-store.html

For a few seconds you see the url of the domain http://createcharts.esy.es but it is very likely that the user does not perceive it. Also, if the network is very fast, it is hardly appreciated.

bubble-spoof-paypal.webm
5.1 MB View Download
Another argument:

The user is convinced that the web page is legitimate so it will not re-watch the url of the toolbar.
Summary: Spoofing via overlaid windows and form validation bubbles (was: Form validation bubbles allow spoofing)
I believe the spoofing via overlaid windows attack is a variant of  Issue 648350 .

I think the spoofing via form validation bubbles (which didn't repro in Chrome 57) is a variant of  Issue 673163 .
Labels: Security_Impact-Stable Security_Severity-Low Team-Security-UX
Mergedinto: 648350
Status: Duplicate (was: Unconfirmed)
I had a look at this on Windows 10. It's pretty imperfect: the pop up window isn't the same size as the window in the background, and the shadow makes it fairly obvious there's something else on top. It also doesn't sit flush.

The spoofing relies on the browser window being maximised fully.

I'm going to assign this a fairly low importance right now, and merge it into  crbug.com/648350 
Since it is a low security bug, could they make it public?
some inconvenience?
Labels: -Restrict-View-SecurityTeam allpublic

Sign in to add a comment