Issue metadata
Sign in to add a comment
|
Security: SOCKS 4/4A HTML injection in malformed socks server ACK response
Reported by
n.ava...@gmail.com,
Aug 16 2017
|
||||||||||||||||||||
Issue description
VULNERABILITY DETAILS
With Chrome configured to use SOCKS server, if evil socks server send a malformed ACK like this:
+----+----+----+----+----+----+----+----+-----------------------
| VN | CD | DSTPORT | DSTIP |<head><title>hacked...
+----+----+----+----+----+----+----+----+-----------------------
bytes: 1 1 2 4 n byte of code to inject
Chrome Insert the injected code at the beginning of all the pages you visit.
You can then change the content of the pages you visit with malicious code
VERSION
Chrome Version: [60.0.3112.101] + stable
Operating System: Windows all version
REPRODUCTION CASE
in attachment a simple socks 4/4a proxy written in python for linux, You must configure chrome to use socks server on port 1080, So try visiting a website like http://www.ansa.it (not work with https site)
Best Regards
Nicola Avanzi
,
Nov 23 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||
Comment 1 by elawrence@chromium.org
, Aug 16 2017Status: WontFix (was: Unconfirmed)