VULNERABILITY DETAILS
Domains and urls persisted on disk even after clear history.
Websites using any of these functionalities, leave a permanent footprint on disk:
1. Push notifications
2. Storage (Local storage / LevelDB)
3. Service workers
4. Filesystem API
Steps to reproduce:
1. Visit all of the following websites:
a. https://mdn.github.io/sw-test/
b. https://gauntface.github.io/
c. https://www.mydealz.de/
d. https://edition.cnn.com/
e. https://www.airfrance.com/ or https://xvideos.com / https://pornhub.com
2. Clear browsing data (basic and advanced) for all time. Make sure all the check boxes are selected.
3. Restart the browser (possibly multiple times).
4. Terminal -> Profile folder ->
The following files / folders still contain the footprints on domains / URL's accessed:
a. "Local Storage/leveldb/"
b. "Service Worker/Database/"
c. "File System/Origins/"
d. "GCM Store/"
e. "GCM Store/Encryption/"
f. "File System/Origins/"
VERSION
Chrome Version: Version 65.0.3325.162 (Official Build) (64-bit)
Operating System: macOS Sierra v 10.12.6
|
Deleted:
mydealz-localstorage-service-worker.png
105 KB
|
|
mydealz-localstorage-service-worker.png
105 KB
View
Download
|
|
|
Deleted:
cnn-filesystem-api.png
60.1 KB
|
|
Deleted:
session-store-pornhub.png
71.7 KB
|
|
Deleted:
air-france-session-store.png
108 KB
|
|
Deleted:
push-notification-github.png
161 KB
|
|
Deleted:
service-worker-mdn.png
153 KB
|
|
Deleted:
clear-history-1.png
83.6 KB
|
|
Deleted:
clear-history-2.png
73.8 KB
|
Comment 1 by elawrence@chromium.org
, Mar 17 2018Labels: -Type-Bug-Security -Restrict-View-SecurityTeam Type-Bug