New issue
Advanced search Search tips

Issue 835687 link

Starred by 1 user

Issue metadata

Status: Duplicate
Merged: issue 827073
Owner:
Closed: Jun 2018
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: iOS
Pri: 2
Type: Bug-Security



Sign in to add a comment

Security: Exported Passwords in Clear within Application Sandbox

Reported by antojose...@gmail.com, Apr 23 2018

Issue description

VULNERABILITY DETAILS

Vulnerable Software : chrome on iOS

Using the new export passwords feature , one can share passwords to different apps. after this process , the file created in /tmp within the application sandbox is deleted . But if one were to force kill the app midway , the file remains in the sandbox in clear . Chrome can check at startup if this file exists and delete it to enhance security for end users .

VERSION
Chrome Version:66.0.3359.122
Chrome on IOS

REPRODUCTION CASE

Go to settings 
Export passwords
When you get the option to share , kill the app by swiping up . Check the application sandbox directory in /tmp folder . Exported Passwords will be available in csv format.
 
6C11CBC4-FC6E-4498-8F1F-4FBE84069726.png
321 KB View Download

Comment 1 by vakh@chromium.org, Apr 23 2018

Cc: palmer@chromium.org
Components: UI>Browser>Passwords
Labels: M-66 Security_Impact-Stable Security_Severity-Low Needs-Feedback OS-iOS
Owner: ioanap@chromium.org
Status: Assigned (was: Unconfirmed)
Thanks for the bug report. Possibly a duplicate of  issue 827073 .

Can you please help me understand what's the threat model here? How can an adversary realistically exploit this? Since it requires the user to follow a very specific set of steps, including killing the app which isn't an obvious thing to do, it does not seem easily exploitable. On top of that, it requires the user to have installed another malicious app that's listening to files in /tmp.

Given that, I'd consider this Security_Severity-Low at best.

palmer@ -- based on your comments on the linked issue, you might disagree with my assessment so feel free to change it.
Hi, Instead of Force close, this could be paired up with a script that can Crash the browser as well.

vulnerabilities with apps which are in the same  "App Groups" can allow access to this file for exfiltration.This could be other Google apps in iOS that belong to the same "App Group".

The exported files are passwords which are of utmost importance and is stored in the iOS keychain ( i think), having them on the disk, in the /tmp folder makes it much easier for an adversary and is not the right thing to do as per iOS app sec guidelines.

Developers did understand the importance of deleting this file after exporting it and it works as intended in the normal interactions. This is an edge case that must have been overlooked. 

This can be fixed by looking for such a file at Application startup and removing it or not having the file written to disk at all 

Project Member

Comment 3 by sheriffbot@chromium.org, Apr 23 2018

Labels: Pri-2

Comment 4 by ioanap@chromium.org, Apr 25 2018

A fix that removes the files at Chrome startup is in for M67.

Comment 5 by palmer@chromium.org, Apr 25 2018

Yes, this does seem like a duplicate of  Issue 827073  to me. ioanap, do you agree? If so, please go ahead and mark this as a duplicate, and CC this bug's reporter on that bug.

Also, can you point us to the CL that landed for 67? Thanks!

Comment 6 by ioanap@chromium.org, Apr 26 2018

The CL that introduced file deletion at startup is: https://chromium-review.googlesource.com/c/chromium/src/+/974181. 

This is indeed a duplicate of  Issue 827073 . I will not be merging the bugs, since the original had a different type of restricted view.


Comment 7 by ioanap@chromium.org, Apr 26 2018

Duplicate of:  Issue 827073 

Comment 8 by palmer@chromium.org, May 30 2018

Re #6: From a security perspective, it is OK (actually, best) to mark that one Restrict-View-SecurityTeam, duplicate this one into it, and then let it become public as usual after the fix has been available for 14 weeks. (A bot does this automatically.)
Project Member

Comment 9 by sheriffbot@chromium.org, May 30 2018

Labels: -M-66 M-67
Mergedinto: 827073
Status: Duplicate (was: Assigned)
Thank you for the advice!
Project Member

Comment 11 by sheriffbot@chromium.org, Nov 2

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment