New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.
Starred by 3 users

Issue metadata

Status: Fixed
Closed: Feb 2018
EstimatedDays: ----
NextAction: ----
OS: Mac
Pri: 1
Type: Bug-Security

Sign in to add a comment

Issue 811117: Myanmar character in domain names can lead to spoofing

Reported by, Feb 11 2018

Issue description

UserAgent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36

Steps to reproduce the problem: not shown in punycode
and you can regist domain ငဝ.com

What is the expected behavior?

What went wrong?
Myanmar (1000— 109F)
U+1004 (င) => c
U+101d (ဝ) => o
U+100c (ဌ) => g
U+1042 (၂) => j
U+1054 (ၔ) => e

Did this work before? N/A 

Chrome version: 64.0.3282.140  Channel: stable
OS Version: OS X 10.13.3
Flash Version: Shockwave Flash 28.0 r0
屏幕快照 2018-02-11 下午11.51.47.png
8.3 KB View Download

Comment 1 by, Feb 11 2018

Components: UI>Security>UrlFormatting UI>Internationalization
Status: Untriaged (was: Unconfirmed)
This could well be working as expected, insofar as "" isn't a real domain and doesn't look like one either. Inter-label character set mixing is different than Intra-label mixing. As noted in,

"Google Chrome decides if it should show Unicode or punycode for each domain label (component) of a hostname separately."

Comment 2 by, Feb 12 2018

Status: Assigned (was: Untriaged)
Jshin@, can you please triage and close if this is working as intended.

Comment 3 by, Feb 13 2018

Status: WontFix (was: Assigned)
This is rather interesting. According to, tries to attract those without .com domain to get an alternative ( <foo>  

Anyway, this is working as intended.

Comment 4 by, Feb 14 2018

Status: Started (was: WontFix)
I'm adding the following 4 entries to the confusability list for Chrome:

U+1004 (င) => c
U+100c (ဌ) => g
U+1042 (၂) => j
U+1054 (ၔ) => e

Thank you for reporting. 

U+101d (ဝ) => o  // this is already covered by Unicode data.

Comment 5 by, Feb 14 2018


Comment 6 by, Feb 14 2018

Labels: Security_Severity-Medium Security_Impact-Stable

Comment 7 by, Feb 15 2018

Thank for the fast fix :-)

Comment 8 by, Feb 15 2018

Project Member
The following revision refers to this bug:

commit 37747f4a4972e6d44d3f956f8d3a63255ef0941a
Author: Jungshik Shin <>
Date: Thu Feb 15 06:56:39 2018

Add more entries to the confusability mapping

U+014B (ŋ) => n
U+1004 (င) => c
U+100c (ဌ) => g
U+1042 (၂) => j
U+1054 (ၔ) => e

Bug:  811117 , 808316 
Test: components_unittests -gtest_filter=*IDN*
Change-Id: I29f73c48d665bd9070050bd7f0080563635b9c63
Reviewed-by: Peter Kasting <>
Commit-Queue: Jungshik Shin <>
Cr-Commit-Position: refs/heads/master@{#536955}

Comment 9 by, Feb 15 2018

Project Member
Labels: M-65

Comment 10 by, Feb 15 2018

Project Member
Labels: -Pri-2 Pri-1

Comment 11 by, Feb 19 2018

Status: Fixed (was: Started) will not be blocked (comment #1, comment #3), but if there's a domain in the top 10k list which can be spoofed by 5 Burmese characters in comment 4, it'll be blocked.

Comment 12 by, Feb 19 2018

Project Member
Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify

Comment 13 by, Feb 19 2018

Labels: reward-topanel

Comment 14 by, Feb 26 2018

Labels: -reward-topanel reward-unpaid reward-500
*** Boilerplate reminders! ***
Please do NOT publicly disclose details until a fix has been released to all our users. Early public disclosure may cancel the provisional reward. Also, please be considerate about disclosure when the bug affects a core library that may be used by other products. Please do NOT share this information with third parties who are not directly involved in fixing the bug. Doing so may cancel the provisional reward. Please be honest if you have already disclosed anything publicly or to third parties. Lastly, we understand that some of you are not interested in money. We offer the option to donate your reward to an eligible charity. If you prefer this option, let us know and we will also match your donation - subject to our discretion. Any rewards that are unclaimed after 12 months will be donated to a charity of our choosing.

Comment 15 by, Feb 26 2018

Congrats zxyrzg02@ - the VRP panel decided to award $500 for this report. A member of our finance team will be in touch to arrange payment. Also, how would you like to be credited in our release notes?

Comment 16 by, Feb 27 2018

Labels: -reward-unpaid reward-inprocess

Comment 17 by, Feb 27 2018

Thanks for the reward! Please credit as "LnyasZhang"

Comment 18 by, Mar 2 2018

Or credit as "Lnyas Zhang", thanks a lot

Comment 19 by, Mar 6 2018

Labels: -M-65 M-66

Comment 20 by, Mar 16 2018

Project Member
Labels: Merge-Request-66

Comment 21 by, Mar 16 2018

Project Member
Labels: -Merge-Request-66 Merge-Review-66 Hotlist-Merge-Review
This bug requires manual review: M66 has already been promoted to the beta branch, so this requires manual review
Please contact the milestone owner if you have questions.
Owners: cmasso@(Android), cmasso@(iOS), josafat@(ChromeOS), abdulsyed@(Desktop)

For more details visit - Your friendly Sheriffbot

Comment 22 by, Mar 19 2018

Labels: -Merge-Review-66 Merge-Approved-66
Approved for M66 - branch:3359

Comment 23 by, Mar 20 2018

The CL for this bug was landed on Feb 15 (2 weeks before M66 branch) :-)

See comment 8.

Comment 24 by, Mar 20 2018

Labels: -Merge-Approved-66

Comment 25 by, Apr 17 2018

Labels: Release-0-M66

Comment 26 by, Apr 25 2018

Labels: CVE-2018-6100

Comment 27 by, Apr 25 2018

Labels: CVE_description-missing

Comment 28 by, May 28 2018

Project Member
Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit - Your friendly Sheriffbot

Comment 29 by, Oct 19

Labels: idn-spoof

Comment 30 by, Jan 4

Labels: -CVE_description-missing CVE_description-submitted

Sign in to add a comment