Issue metadata
Sign in to add a comment
|
Security: Exported Passwords in Clear within Application Sandbox
Reported by
antojose...@gmail.com,
Apr 23 2018
|
||||||||||||||||||||||||
Issue descriptionVULNERABILITY DETAILS Vulnerable Software : chrome on iOS Using the new export passwords feature , one can share passwords to different apps. after this process , the file created in /tmp within the application sandbox is deleted . But if one were to force kill the app midway , the file remains in the sandbox in clear . Chrome can check at startup if this file exists and delete it to enhance security for end users . VERSION Chrome Version:66.0.3359.122 Chrome on IOS REPRODUCTION CASE Go to settings Export passwords When you get the option to share , kill the app by swiping up . Check the application sandbox directory in /tmp folder . Exported Passwords will be available in csv format.
,
Apr 23 2018
Hi, Instead of Force close, this could be paired up with a script that can Crash the browser as well. vulnerabilities with apps which are in the same "App Groups" can allow access to this file for exfiltration.This could be other Google apps in iOS that belong to the same "App Group". The exported files are passwords which are of utmost importance and is stored in the iOS keychain ( i think), having them on the disk, in the /tmp folder makes it much easier for an adversary and is not the right thing to do as per iOS app sec guidelines. Developers did understand the importance of deleting this file after exporting it and it works as intended in the normal interactions. This is an edge case that must have been overlooked. This can be fixed by looking for such a file at Application startup and removing it or not having the file written to disk at all
,
Apr 23 2018
,
Apr 25 2018
A fix that removes the files at Chrome startup is in for M67.
,
Apr 25 2018
Yes, this does seem like a duplicate of Issue 827073 to me. ioanap, do you agree? If so, please go ahead and mark this as a duplicate, and CC this bug's reporter on that bug. Also, can you point us to the CL that landed for 67? Thanks!
,
Apr 26 2018
The CL that introduced file deletion at startup is: https://chromium-review.googlesource.com/c/chromium/src/+/974181. This is indeed a duplicate of Issue 827073 . I will not be merging the bugs, since the original had a different type of restricted view.
,
Apr 26 2018
Duplicate of: Issue 827073
,
May 30 2018
Re #6: From a security perspective, it is OK (actually, best) to mark that one Restrict-View-SecurityTeam, duplicate this one into it, and then let it become public as usual after the fix has been available for 14 weeks. (A bot does this automatically.)
,
May 30 2018
,
Jun 4 2018
,
Nov 2
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by vakh@chromium.org
, Apr 23 2018Components: UI>Browser>Passwords
Labels: M-66 Security_Impact-Stable Security_Severity-Low Needs-Feedback OS-iOS
Owner: ioanap@chromium.org
Status: Assigned (was: Unconfirmed)