Issue metadata
Sign in to add a comment
|
bypass xss auditor of google chrome browser (Run JavaScript from the omnibox)
Reported by
whathack...@gmail.com,
Feb 21 2018
|
||||||||||||||||||||
Issue descriptionUserAgent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.167 Safari/537.36 Steps to reproduce the problem: 1. open google chrome browser 2. in url enter the payload "javascript:alert(document.cookie)" 3. on the page its displaying the cookie value . What is the expected behavior? Xss attack is being executed on the browser and revealing cookies and other sensitive information and finally it can lead to RCE. What went wrong? The Xss Auditor is not sanitizing the xss payload provided in the URL thus allowing it to execute javascript code which can lead to various attacks. Did this work before? Yes Version 64.0.3282.167 Chrome version: 64.0.3282.167 Channel: stable OS Version: 10.0 Flash Version: N/A
,
Feb 21 2018
Hi Team, Can i know why this not a security vulnerability, when i got got same issue on android mobile chrome application and found cookie with APISID ,SAPISID information. Thanks
,
Feb 21 2018
A user's ability to run the JavaScript of their choosing on a loaded web page is not a security vulnerability, as noted in the FAQ in comment #1. "XSS" stands for "cross-site scripting" and refers to a case where one site is able to read or write information from another site, typically by causing JavaScript code to execute in the victim site's context. In the scenario described in this issue, there's only one site, and the *user* themselves executes script against that site. As the browser is the user's agent, this is expected behavior.
,
Feb 22 2018
Hello , What I am doing here is that i am able to bypass the xss auditor as it should block such pop up's from coming up , you are considering it as an xss attack on a website but i m just using javascript scheme in the url to execute xss on the browser and the main point here is that i am bypassing xss auditor. can you please have a look at this again ? In browsers like mozilla such attacks are possible because of no usage of xss auditor. thanks
,
Feb 22 2018
I'll repeat: You can open Chrome's developer tools console and type the same JavaScript (without the leading "javascript:" prefix and see the same behavior. This is working as expected. In contrast, the XSS Auditor combats "Reflected XSS" attacks; you can learn more about how it works here: https://sites.google.com/a/chromium.org/dev/developers/design-documents/xss-auditor
,
Feb 22 2018
,
May 31 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||
Comment 1 by elawrence@chromium.org
, Feb 21 2018