New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 826364 link

Starred by 2 users

Issue metadata

Status: Fixed
Owner:
Closed: Mar 2018
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug-Security



Sign in to add a comment

Security: RFI / XSS on https://www.chromestatus.com/

Reported by tthe.dol...@gmail.com, Mar 27 2018

Issue description

VULNERABILITY DETAILS
A regular user assumes that its just a normal site owned by google. 
The user received somehow a link (chat, gmail, whatever) and clicks on it and could be phished or similar.

REPRODUCTION CASE
Just open 
https://www.chromestatus.com/delay?url=https://gist.githubusercontent.com/lNobodyl/9be5194bd6dc5eb60b715586b82de312/raw/a2ca2a1031f67852c6c6a35b1630a932b80f98c5/index.html&delay=2 (https://www.chromestatus.com/delay?url=http://www.google.de&delay=2).
As you can see the web application will fetch that site and "print" that output.
Video: https://www.youtube.com/watch?v=j9RGn_OrN_M&feature=youtu.be

I already reported it to Google VRP (https://issuetracker.google.com/issues/76258447) but they recommended to report it here, because the issue will be resolved faster, as I will talk to the right people directly.

BTW I found that vulnerability via whitebox testing (https://github.com/GoogleChrome/chromium-dashboard/blob/master/server-delay.py#L38).

"
Thanks a lot for looking into it and reporting. This looks like an issue in Chrome and they have their own team for handling incoming security reports. Please report the bug at https://code.google.com/p/chromium/issues/entry?template=Security%20Bug instead - the issue will be resolved faster, as you'll talk to the right people directly. Security bugs in Chrome and Chrome OS are also eligible for a reward under the Chrome Vulnerability Rewards Program (https://www.google.com/about/appsecurity/chrome-rewards/).
"
 
Cc: ericbidelman@chromium.org
Status: Untriaged (was: Unconfirmed)

Comment 2 by mmoroz@chromium.org, Mar 27 2018

Labels: Needs-Feedback
I'm not sure we can do anything with that. Any person can buy a domain with "chrome" substring in its name, write something like "I'm Google", and serve any HTML / javascript that'd like. I don't see any browser bug being exploited here.

1) You mentioned RFI (I guess , https://www.owasp.org/index.php/Testing_for_Remote_File_Inclusion). Could you please clarify which file are you able to remotely include and where exactly that would happen?

2) You also mentioned XSS (probably https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) ). But the javascript served from www.chromestatus.com domain doesn't seem to be executed cross-site. Am I wrong?
Hey,

thank you for your quick response.
You are right that you could easily buy a domain with "chrome" as a substring, nevertheless there is clearly a vulnerability in this web application owned by Google and it should be fixed.

Furthermore that domain is special, because it is unique. There is only one domain named like this and as a normal user, you surely think thats a site you can trust.

1)
The web application takes that url param, fetches its content and prints it into the page. So I could easily create a phishing page, steal cookies whatever, I can control the output. It's like I own that page.
I would say that's indeed a RFI vulnerability and it is not harmless at all.


Maybe this is more clear: https://www.chromestatus.com/delay?url=https://pastebin.com/raw/KEVbY5rY&delay=2 .

I don't have much time, but if you really want more proofs I can clone the Google Login page and create a complete phishing page.

Kind Regards

Status: Fixed (was: Untriaged)
Fixed by https://github.com/GoogleChrome/chromium-dashboard/commit/03630d07a8f3bacaeb397b889c42f2ee2449e0d1

That handler was old and around for testing. We're removed it from the site.

Comment 5 by mmoroz@chromium.org, Mar 27 2018

Labels: -Needs-Feedback reward-topanel
Thanks for your clarifications in c#3. I'm not sure which labels I should put here, as our guidelines do not seem to cover Chrome infrastructure: https://www.chromium.org/developers/severity-guidelines

But I've added reward-topanel label, which means the VRP would take a look at this report and decide if it's eligible for a reward.
Hey,

I can confirm that the vulnerability is fixed now and btw:

I'm sorry.. I think you were right... 
The right term for that vulnerability is SSRF as described here: https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF .


Kind Regards
Project Member

Comment 7 by sheriffbot@chromium.org, Mar 28 2018

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify

Comment 8 by mmoroz@chromium.org, Mar 28 2018

Labels: Security_Impact-None
Hey,

any updates from the bug reward panel?

Kind Regards
Hello tthe.dollarr@ - pardon the delay on the reward front - looking into this now.
Cc: jakl@google.com evn@google.com
Hello awhalley@ - no problem - take your time.
Labels: -reward-topanel reward-unpaid reward-500
Hello tthe.dollarr@ - I've been working with the main Google VRP, who decided that this report should get an award of $500. A member of our finance team will be in touch to arrange for payment.  Cheers!
Labels: -reward-unpaid reward-inprocess
Hello awhalley,

thank you for your quick response. I appreciate the bounty!

Thank you
Owner: awhalley@chromium.org
awhalley - could you set the sec severity label on this one just to close it out based on payout?  Thanks.
Labels: Security_Severity-NA
Thanks tsepez - setting to Security_Severity-NA since this was in  infrastructure and sits outside our usual severity ratings.
Components: Infra>Security
Project Member

Comment 19 by sheriffbot@chromium.org, Jul 4

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment