New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 793893 link

Starred by 1 user

Issue metadata

Status: Duplicate
Merged: issue 792878
Owner: ----
Closed: Dec 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug-Security



Sign in to add a comment

Security: Leaching passwords

Reported by mariu...@gmail.com, Dec 11 2017

Issue description

VULNERABILITY DETAILS

Leaching stored credentials without password of current user

VERSION
Chrome Version: [63.0.3239.84 (Official Build) (64-bit)] + [stable]
Operating System: [My OS: Windows 10 pro, Version 1709 could not find my service pack]

I have reproduced it on several different Windows machines

REPRODUCTION CASE
How to leach stored credentials in Chrome from a user that did not log out.


If you log in to Chrome on the PC you can synchronize the passwords, and log out again, and the person that is logged in on the PC will not know it. And you can log into Chrome on your own pc and, and then you can see the other person's stored credentials.

How to do it:

1. Open or access Chrome, without logging the other user out
2. In the top right corner of your tab there is a little icon, just at the left 
   side of the minimizing button. Click it and sign in with your own gmail
3. A pop-up message will appear, it will ask you to synchronize passwords, Just 
   click “ok”
4. Now press the the 3 dots right under the red X for closing the window, and 
   select “Settings”
5. At the top you will see “People” and press the sign out button
6. When you press the sign out button a pop-up message appears, and in the 
   bottom of it just click on the “Also remove your existing data from this 
   device” and sign out. Performing this step, makes it harder to trace
7. Sign into any device where you know the password of a user, and open Chrome, 
   and sign into Chrome like step 2 and 3
8. Open “Settings” (step 5), and scroll down to the bottom and press “Advanced”
9. Scroll down to “Manage passwords” and select it.
10. It will the show you all your saved Credentials including those synchronized 
    from the other user
11. By clicking the eye and entering you local user password, you can see the 
    full credentials of the other user that you leached the stored credentials 
    from.

A possible solution:
  - ask for local user password before the synchronization in step 3 
 


 
Components: Services>Sync
Mergedinto: 792878
Status: Duplicate (was: Unconfirmed)
This boils down to "A user with logged in access to your user account can steal data from your user account" and that is working as designed:

https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Why-arent-physically_local-attacks-in-Chromes-threat-model

At step #2, the "Sign in to Chrome" link appears if the user isn't already signed into Chrome; if the user is already signed in, that link isn't present, and you'd have to sign the user out of Chrome, then sign in with your account. Then you could steal their data via sync. [1]

At step #6, if you remove local data, the user would likely notice that all of their data had gone missing. 

[1] https://chromium.googlesource.com/chromium/src/+/lkcr/docs/security/faq.md#Signing-out-of-Chrome-does-not-delete-previously_synced-data 

Comment 2 by mariu...@gmail.com, Dec 12 2017

ok :D
Project Member

Comment 3 by sheriffbot@chromium.org, Mar 20 2018

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment