Issue metadata
Sign in to add a comment
|
Security: Chrome URL spoofing with serveral functions
Reported by
ma7h1a...@gmail.com,
Aug 10 2017
|
||||||||||||||||||||||
Issue descriptionChrome URL spoofing with serveral functions 2017.8.10 AFFECTED PRODUCTS -------------------- chrome 59.0.3071.115 DESCRIPTION -------------------- this attack shows that if target site use any function like alert/prompt/confirm we could spoofing to it. when test on firefox , it set content of document to null at once. 1.attacker's website is 127.0.0.1 2.the target site is www.math1as.com 3.do not need any user gesture (click is just for test) :) i am to lazy to find a google site for test , so test on my own server but https://newsstand.google.com/ shows there must be many websites like this as u can see it use alert function , but could not exploit because of time-out PoC -------------------- poc.html put in local httpserver attack.gif shows how to make this attack SOLUTION -------------------- if chrome redirect to another website,please set the document content to null before load the page like what firefox do. CREDIT -------------------- This vulnerability was discovered by mathiaswu of Tencent's Xuanwu Lab.
,
Aug 10 2017
,
Aug 10 2017
,
Nov 17 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by kenrb@chromium.org
, Aug 10 2017