New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 722524 link

Starred by 7 users

Issue metadata

Status: Fixed
Owner:
Closed: May 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows
Pri: 2
Type: Bug

Restricted
  • Only users with EditIssue permission may comment.



Sign in to add a comment

Downloaded .SCF file can leak credentials via SMB

Project Member Reported by nparker@chromium.org, May 15 2017

Issue description

VULNERABILITY DETAILS
A downloaded .scf file with reference to an SMB link will send the username and hashed password to an attacker-controlled endpoint.

Reported here:
http://defensecode.com/news_article.php?id=21
PDF attached.

VERSION
Chrome Version: not reported
Operating System: Windows XP/8/10 at least
 
Stealing-Windows-Credentials-Using-Google-Chrome.pdf
439 KB Download
SBClientDownload.DownloadExtensions metric says there were only 12 .SCF files downloaded in the last 7 days. That is extremely small. It'd be fairly safe for us to mark this file as "dangerous" so it can't be downloaded without a warning.

Comment 3 by palmer@chromium.org, May 15 2017

Summary: Downloaded .SCF file can leak credentials via SMB (was: Downloade .SCF file can leak credentials via SMB)
Cc: lottie@chromium.org
Labels: -Type-Bug-Security -Restrict-View-SecurityTeam Restrict-View-Google Type-Bug
Owner: nparker@chromium.org
Status: Assigned (was: Unconfirmed)
Project Member

Comment 7 by bugdroid1@chromium.org, May 15 2017

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/25ac3c481a621cec69d1dec92abb7efee9a33d27

commit 25ac3c481a621cec69d1dec92abb7efee9a33d27
Author: nparker <nparker@chromium.org>
Date: Mon May 15 23:05:35 2017

Treat .scf files as dangerous.

hey'll show a warning on every download. These files are very rarely
downloaded, so it won't increase warning fatigue.

BUG= 722524 
CQ_INCLUDE_TRYBOTS=master.tryserver.chromium.linux:closure_compilation

Review-Url: https://codereview.chromium.org/2881093003
Cr-Commit-Position: refs/heads/master@{#471941}

[modify] https://crrev.com/25ac3c481a621cec69d1dec92abb7efee9a33d27/chrome/browser/resources/safe_browsing/download_file_types.asciipb

Status: Fixed (was: Assigned)
I pushed this as v11 of file_type_policies component update.  It should get to most active clients by tomorrow, if not sooner.
Cc: blumberg@chromium.org
Just for reference per Nathan:

To check if you have the fix: If chrome://components/ has "File Type Policies" at v11, then you have the fix.

Are there plans to communicate this externally so folks know this is no longer a concern and how they can check to verify if they are 'patched'?
Cc: steina@google.com jsc...@chromium.org
Aaron -- What are the plans for external communication about this fix?  I see more news stories appearing, which describe it still as an issue.

+jschuh who can add more color on the severity (or lack there of) of the issue in the first place.
Labels: Security_Impact-Stable Security_Severity-Low
This requires a lot of unusual preconditions to be a practical attack. First, this is blocked by the default configuration of any firewall or NAT--even the local firewall on Windows--so the overwhelming majority of Windows systems just don't have any realistic attacker exposure. Then it's further mitigated by the mix of non-standard, legacy configuration options required to make this a practical concern for Win7+, which is the earliest version we support.

I'll mark it low-severity out of an abundance of caution, but pragmatically speaking the population of real-world users impacted by this is de minimis. It's also public already, so is there any reason to keep it view restricted?

Labels: -Restrict-View-Google
Removing view restrictions.
Labels: Restrict-AddIssueComment-EditIssue
 Issue 724638  has been merged into this issue.

Sign in to add a comment