New issue
Advanced search Search tips

Issue 839864 link

Starred by 2 users

Issue metadata

Status: Duplicate
Merged: issue 780897
Owner: ----
Closed: May 2018
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug-Security



Sign in to add a comment

XSS via DATA URI

Reported by iamskid...@gmail.com, May 4 2018

Issue description

data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==

Put this on your browser and a xss popup will fire up
 
Mergedinto: 780897
Status: Duplicate (was: Unconfirmed)
Summary: XSS via DATA URI (was: XSS)
https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Does-entering-JavaScript_URLs-in-the-URL-bar-or-running-script-in-the-developer-tools-mean-there_s-an-XSS-vulnerability.

A user running script via the omnibox or the developer tools is not a vulnerability in Chrome.

Instead of running the script via a JavaScript URL, however, this issue instead shows running the script by loading an SVG document contained in a data URL. A SVG document loaded from a data URL is allowed to execute script, and does so as reflected in your screenshot.

This does not represent a security vulnerability in Chrome. 
Project Member

Comment 2 by sheriffbot@chromium.org, Aug 11

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment