Issue metadata
Sign in to add a comment
|
Page content not updated upon navigation when new page calls window.stop()
Reported by
rohitk0...@gmail.com,
Apr 16 2017
|
||||||||||||||||||||||||
Issue descriptionUserAgent: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36 Steps to reproduce the problem: 1. Load the attached and allow popups 2. Switch tabs 3. What is the expected behavior? As url is updated or commited then UI should be updated What went wrong? UI spoofed or not updated Did this work before? N/A Chrome version: 57.0.2987.133 Channel: stable OS Version: 10.0 Flash Version: Shockwave Flash 25.0 r0
,
Apr 17 2017
Attached, please look
,
Apr 17 2017
Thank you for providing more feedback. Adding requester "nparker@chromium.org" to the cc list and removing "Needs-Feedback" label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Apr 17 2017
I /think/ this is something that we addressed recently; someone in the navigation space (+creis) probably knows more.
I believe the relevant part of this repro is that the target "testathost.blogspot.in" site has this script at the top:
<script>
window.stop();
</script>
I cannot reproduce ANY badness at all in Chrome 60 on Windows.
In Chrome 57 on Windows, I do get a repro, but it's quite limited in scope. To repro, you must allow the navigation to "testathost.blogspot.in", then *immediately* switch to another tab for a few seconds, then switch back to the repro tab. When you do that, we show the prior/incorrect markup. If you stay on the repro tab without switching, the whole thing paints in gray after about four seconds, but if you switch tabs and switch back, it shows the prior/incorrect markup. Note that it's a "dead" image-- the user cannot select content in the markup or otherwise interact with it, limiting exploitability to out-of-band attacks ("Call this number immediately!"). Another gating factor is that the victim (whose domain you want to spoof) needs to be delivering the window.stop() call.
,
Apr 17 2017
Thanks elawrence. I'm pretty convinced this is not a useful attack given the gating factor you cited. creis -- if this points a larger issue, feel free to reopen.
,
Apr 17 2017
Oops, and I meant add: Marking WontFix since it's already fixed in M60, and not worth merging.
,
Apr 20 2017
Thanks for providing the feedback. I think this attack although limited in scope is still page content spoof and can be used to trick the user and therefore should be patched. Also we have just received update of chrome to version 58 from 57 on which I reported this bug and chrome version 60 will take some time, there if possible it should be patched for chrome 58. Also there is little change for this bug behavior on chrome 58, where the page content changes however the title remains the same.
,
Apr 21 2017
From the behavior described in comment 6, this sounds like a duplicate of issue 672847 , which was fixed in M58. Fixed here means we expect the page content to disappear in 4 seconds, and not come back if the user switches tabs and comes back. That's what I'm seeing on M58. Ken, can you confirm? (This is already closed, but I think marking it a duplicate of the fixed bug may be more accurate than WontFix.)
,
Apr 21 2017
Correct, it is a duplicate. #9: The omnibar updates with the new URL when the old page has been unloaded from the renderer, even though you can still see the graphics on from the original page. Usually the new page paints within a fraction of a second so the omnibar update looks simultaneous, but there are ways to prevent it from ever painting (such as what your test case does). In that case we evict the old graphics after 4 seconds, showing blank. The trick about switching active tabs to make the graphics reappear was fixed in 58.
,
Jul 25 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by nparker@chromium.org
, Apr 16 2017