New issue
Advanced search Search tips

Issue 728318 link

Starred by 2 users

Issue metadata

Status: WontFix
Owner: ----
Closed: Jun 2017
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows
Pri: 2
Type: Bug-Security



Sign in to add a comment

(Arbitrary?) code execution via crafted inline base64 pdf inserted into HTML page

Reported by jennycha...@gmail.com, May 31 2017

Issue description

UserAgent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36

Steps to reproduce the problem:
1. example js file (https://static.nhentai.net/js/combined.1885135422c4.js)
2. note that their is a section that has base64 encoded string mimicking pdf
3. when run, code will take advantage of pdf viewer to open popups (but can potentially be used for more malicious actions)

What is the expected behavior?
A quick - almost imperceptible opening/closing of a modal dialog box reading (Chrome PDF Viewer - Please wait..) followed by Popups are created underneath current active window 

What went wrong?
I feel that being able to inject and run code via PDF shouldn't be something that can happen

Did this work before? N/A 

Chrome version: 58.0.3029.110  Channel: stable
OS Version: 6.1 (Windows 7, Windows Server 2008 R2)
Flash Version: 

Please let me know if I was just paranoid or not.
 
nhentai.js
59.5 KB View Download
decoded.txt
1.8 KB View Download
For some unknown reason. On www.nhentai.net - this will only occur during your first visit. I am not sure why this is it (IP address/Cookie caching/IDK)

But a more reliable way to see this same mechanism in action is www.kissanime.ru (the same thing should happen every time you click "play" on any selected anime)
(like when you click this http://i.imgur.com/V1muTO5.png)

Another would be http://popunderjs.com/ - the service that I believe both nhentai and kissanime are using and that are actually developing this "exploit"
Components: Internals>Plugins>PDF
This appears to be similar to Issue 618362. 

I believe it's expected that an embedded PDF can run script, but it shouldn't be able to bypass the popup blocker.
In visiting that site (NSFW, btw), I don't see any popups until I click. A click is a user-initiated-action gesture which allows a single popup to open.
Thanks for the reply. I was just concerned that this might be a possible loophole since I did not know that "it's expected that an embedded PDF can run script".

So I am assuming that despite being able to run script, embedded PDF files would not be able to do more (e.g. install extensions & log passwords, etc) - and that indeed this feature is safe?
Status: WontFix (was: Unconfirmed)
Yeah, this is just a PDF file embedded in the page; PDFs can have embedded JavaScript that runs if JavaScript is enabled in the browser. 

In the past, the most interesting thing you could do with JavaScript-embedded in PDF in Chrome was circumvent the popup blocker, but that vector should be closed at this point.
Project Member

Comment 6 by sheriffbot@chromium.org, Sep 13 2017

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment