Issue metadata
Sign in to add a comment
|
Security: Root can be accessed through oobe/lock without developer mode
Reported by
jeremyeb...@gmail.com,
Dec 18 2017
|
||||||||||||||||||||
Issue descriptionVULNERABILITY DETAILS Access to root files and root can be accessed through windows opened through chrome://inspect and clicking inspect on chrome://oobe/lock VERSION ChromeOS 64.0.3282.24, dev channel. REPRODUCTION CASE 1) Go to settings and turn screen lock ON (IT MUST BE ON) 2) Navigate to chrome://inspect/#other 3) If chrome://oobe/lock shows up, press the inspect button below. If it doesn't show up, restart the computer and/or wait. 4) When the inspect tab is up, it should have the incognito icon in the top left corner. 5) Navigate to "Application" on the top bar. 6) Click "read more about the manifest" 7) This should open in an incognito window. 8) Press ctrl*n to open a normal new window. This window will have no policy, extensions, etc. 9) If you sideload something like crosh, you can gain full root access to the system without developer mode. A COUPLE THINGS TO NOTE: 1) I will update these comments as I try more things. I have gained full root access once and will try again later. 2) This all occurs on a Chromebook that is enterprise restricted and cannot open incognito mode or developer mode. 3) Issue 795822 is linked to this one. This issue is towards the glitch of a password input not being recognized or authenticated if chrome://oobe/lock shows in chrome://inspect#other.
,
Dec 19 2017
Reporter: Is this the same issue as crbug.com/795477 ?
,
Dec 19 2017
+cthomp@chromium.org No. That one is focused on the incognito window (which is a step in this bug) and was apparently a duplicate and this one is based on gaining unauthorized root access via the same exploit, but in a different way.
,
Dec 19 2017
Issue 796184 has been merged into this issue.
,
Dec 19 2017
cthomp@chromium.org do you need anything (logs, screenshots, etc)?
,
Dec 19 2017
Jorge, want to take a shot or re-assign as appropriate? Am I correct in setting sev-critical? Thanks.
,
Dec 19 2017
jeremyebaum: What do you mean by "9) If you sideload something like crosh", specifically, what do you mean by "sideloading"?
,
Dec 19 2017
I'm going to tentatively assign this to Xiaoyong, the current sheriff, and add myself to CC.
,
Dec 19 2017
@jorgelo@chroium.org On a Chromebook, crosh is loaded as an extension. However, in one of these windows, crosh does not work as extensions don't work. The chrome web store does also not recognize this window as being a chrome window. However, if you download a .crx for crosh manually and apply it to this window, this crosh window has root priviledge, as this window has no policy, restrictions, etc.
,
Dec 19 2017
Thanks! Two more questions: -By "applying to this window", do you mean going to chrome:extensions and installing from there? -When you say "root privilege", do you mean that if you open crosh you have root access to the underlying system, or something else?
,
Dec 19 2017
jorgelo@chromium.org 1) Yes, I don't think there is another way. 2) Yes, I can edit files in the root directory, and I could hypothetically install crouton or something like that I believe
,
Dec 19 2017
I can reproduce this till step 8. Step 9 does not work probably because of corp restrictions that disabled side loading apps. I tried a couple of other methods to install the crosh crx file and get rejected with error message: this can only be added from Chrome Web Store". jeremyebaum, could you share more details on how you installed crosh in from chrome://extensions? If you have screen shots, that will be great. I appreciate your help.
,
Dec 20 2017
Change to severity high, because it requires user interaction. jeremyebaum, I also have some question about root access, do you mean you can access the file in /root directory? Can you also share some screenshots on this as well? Thanks.
,
Dec 20 2017
So I can’t actually reproduce it without a flash drive with a crosh extension file. I can’t do that right now as I’m out and about but I can try later if you’d like. And yes, you can access the root directory using cd and ls. At least when I originally did it, that’s what worked. However I don’t know if I can reproduce it again as the policy Chromebook I have has extensions blocked in general now. If you could link me the .crx file, that’d be super helpful. Thanks.
,
Dec 20 2017
Alright, so I tried again... It won't let me sideload the extension. If the extension is sideloaded, I can guarantee that root would work. The reason I can't sideload it is because the file browser won't open to select the extension. I'm bummed - this originally worked and didn't work. I was hoping I'd be able to help more...
,
Dec 20 2017
When I produced the bug originally, I could open a crosh tab and then open shell (no sideloading needed). Second time, I needed to sideload. Today, it doesn't work, I assume from new policy restrictions.
,
Dec 20 2017
,
Dec 20 2017
Hi, jeremyebaum, thanks a lot for the quick replies. The /root directly is readable and executable by default. However, it is only writable by root. Next time, if you successfully run crosh, could you please try to write to that folder, for example, create a new file and write something to it. On Chrome OS, we never run any extensions as root. I will very surprised if crosh run as root. Thanks again.
,
Dec 20 2017
I was able to access the root file along with read them. However, I’ll try again when I get a little bit of time. Thanks.
,
Dec 22 2017
Change to medium because lack of evidence showing root privilege is compromised.
,
Dec 23 2017
I think it may have been patched. I can’t achieve root access anymore. This specific way most likely isn’t possible anymore, although I don’t doubt that there are other ways. Thanks for your time guys.
,
Dec 24 2017
jeremyebaum@, thanks a lot for your time reporting this issue and your help debugging this issue. Closing the bug for now because unable to reproduce.
,
Apr 2 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||
Comment 1 by cthomp@chromium.org
, Dec 19 2017Labels: Security_Impact-Stable OS-Chrome
Status: Untriaged (was: Unconfirmed)