Issue metadata
Sign in to add a comment
|
Security: IDN domain spoof with unicode (U+0F37 U+0F84)
Reported by
xis...@gmail.com,
Aug 17 2017
|
||||||||||||||||||||||||
Issue description
VULNERABILITY DETAILS
IDN domain google+(U+0F37).com and google+(U+0F84).com ,display does not use punycode encoding in Chrome ,and in browser tab, the two characters are hidden.
VERSION
Chrome Version: 60.0.3112.101 stable (64-bit), 62.0.3184.0 canary (64-bit)
Operating System: MAC OS 10.12.5/10.13
REPRODUCTION CASE
<script>
function aa(){
window.open('https://www.xn--google-usv.com','new','width=800,height=600');
}
function bb(){
window.open('https://www.xn--google-87v.com','new1','width=800,height=600');
}
</script>
<button onclick='aa()'>dddd</button>
<button onclick='bb()'>dddd</button>
,
Aug 18 2017
,
Aug 21 2017
Sigh..... I wish U+25CC (dotted circle) were used across the board when a base character and a combining mark belong to different scripts (the condition is a bit more complex, but the gist is that). I thought at least Blink uses U+25CC (even though Omnibox - native layout - does not), but it does not on my Ubuntu box (DejaVu Sans Mono for Latin and Tibetan Machine Uni for Tibetan). Perhaps, the latter font does not have U+25CC. google༷.com (U+0F37 after 'e'). Filed http://bugs.icu-project.org/trac/ticket/13328 . In the meantime, this issue strengthens an argument for going back to 'Highly Restrictive script mixing' (only allow mixing of CJK + Latin). Wait... examples in this bug report cannot be registered at least for Verisign-controlled TLDs because it violates Verisign's script mixing rules. See https://www.verisign.com/en_US/channel-resources/domain-registry-products/idn/idn-policy/registration-rules/index.xhtml .
,
Aug 21 2017
Given the last para in the previous comment, security risk is rather low and I'm even tempted to open up this issue to the public.
,
Aug 22 2017
,
Aug 29 2017
,
Sep 25 2017
bug 726950 is about U+0F35 after a Latin base character..
,
Oct 4 2017
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/fd34ee82420c5e5cb04459d6e381944979d8e571 commit fd34ee82420c5e5cb04459d6e381944979d8e571 Author: Jungshik Shin <jshin@chromium.org> Date: Wed Oct 04 23:25:49 2017 Change the script mixing policy to highly restrictive The current script mixing policy (moderately restricitive) allows mixing of Latin-ASCII and one non-Latin script (unless the non-Latin script is Cyrillic or Greek). This CL tightens up the policy to block mixing of Latin-ASCII and a non-Latin script unless the non-Latin script is Chinese (Hanzi, Bopomofo), Japanese (Kanji, Hiragana, Katakana) or Korean (Hangul, Hanja). Major gTLDs (.net/.org/.com) do not allow the registration of a domain that has both Latin and a non-Latin script. The only exception is names with Latin + Chinese/Japanese/Korean scripts. The same is true of ccTLDs with IDNs. Given the above registration rules of major gTLDs and ccTLDs, allowing mixing of Latin and non-Latin other than CJK has no practical effect. In the meantime, domain names in TLDs with a laxer policy on script mixing would be subject to a potential spoofing attempt with the current moderately restrictive script mixing policy. To protect users from those risks, there are a few ad-hoc rules in place. By switching to highly restrictive those ad-hoc rules can be removed simplifying the IDN display policy implementation a bit. This is also coordinated with Mozilla. See https://bugzilla.mozilla.org/show_bug.cgi?id=1399939 . BUG= 726950 , 756226 , 756456 , 756735 , 770465 TEST=components_unittests --gtest_filter=*IDN* Change-Id: Ib96d0d588f7fcda38ffa0ce59e98a5bd5b439116 Reviewed-on: https://chromium-review.googlesource.com/688825 Reviewed-by: Brett Wilson <brettw@chromium.org> Reviewed-by: Lucas Garron <lgarron@chromium.org> Commit-Queue: Jungshik Shin <jshin@chromium.org> Cr-Commit-Position: refs/heads/master@{#506561} [modify] https://crrev.com/fd34ee82420c5e5cb04459d6e381944979d8e571/components/url_formatter/idn_spoof_checker.cc [modify] https://crrev.com/fd34ee82420c5e5cb04459d6e381944979d8e571/components/url_formatter/url_formatter_unittest.cc
,
Oct 4 2017
,
Oct 5 2017
,
Oct 16 2017
,
Dec 4 2017
,
Dec 4 2017
,
Jan 11 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Apr 25 2018
,
Oct 5
,
Oct 19
|
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by rsesek@chromium.org
, Aug 17 2017Labels: Security_Severity-Medium Security_Impact-Stable OS-Mac OS-Windows Pri-1
Owner: js...@chromium.org
Status: Assigned (was: Unconfirmed)
57.3 KB
57.3 KB View Download