New issue
Advanced search Search tips

Issue 786818 link

Starred by 1 user

Issue metadata

Status: Duplicate
Merged: issue 126398
Owner: ----
Closed: Nov 2017
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug-Security



Sign in to add a comment

Security: Bypassing Password Manager lock for saved passwords

Reported by wass...@gmail.com, Nov 19 2017

Issue description

VULNERABILITY DETAILS
Chrome's Password Manager is locked through the local user's master password (the OS account password) and access to saved passwords is only granted after the user types the OS password again in chrome://settings/passwords however this can easily be bypassed as detailed below.

The bug in question is related to the Chrome auto-fill feature: When a user navigates to a website for which chrome has saved a password, the log-in form is automatically filled with the username and password. Our attack simply uses the Chrome Developer tools to inspect the password field and unmask its characters (as opposed to the regular `*****` shown on normal password fields).

To perform the attack, a user who has physical or remote access to the computer (could also be done through a Chrome extension) can simply perform the following steps:

1. Navigate to the target website
2. Chrome fills the user/password fields automatically which already allows access to the website, however it does not give away the password (which is masked with asterisk characters)
3. Perform an "inspect element" on the password field.
4. Change the <input> element `type` field from `password` to `text`
5. The password is now shown in plain sight (which would have otherwise required a re-login to the local OS account if accessed through the Password Manager).

This attack doesn't require the user to access the file system, which makes it easy to deploy Chrome extensions that perform this attack without the user noticing. A list of available passwords can be accessed through chrome://settings/passwords without need for log-in.

VERSION
Chrome Version: 62.0.3202.94 stable
Operating System: OS X High Sierra Beta
 
Screen Shot 2017-11-19 at 3.15.12 PM.png
280 KB View Download
Components: UI>Browser>Passwords
Mergedinto: 126398
Status: Duplicate (was: Unconfirmed)
That's correct. A physically-local attacker has numerous mechanisms available to obtain the user's passwords. The prompt for the system password on the chrome://settings/passwords page is not a security boundary (and that prompt isn't even present on some platforms.)

https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#What-about-unmasking-of-passwords-with-the-developer-tools
Project Member

Comment 2 by sheriffbot@chromium.org, Feb 26 2018

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment