New issue
Advanced search Search tips

Issue 845767 link

Starred by 2 users

Issue metadata

Status: WontFix
Owner: ----
Closed: May 2018
Cc:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug-Security



Sign in to add a comment

CSP implementation failure

Reported by arjuniet...@gmail.com, May 23 2018

Issue description


I notices in morning that while doing the POC for bug reporting for another site that google chrome is allowing me to do it very smoothly while on the other hand firefox varients like firefox and firefox is not allowing me to do this without disabling the CSP parameter.

its a huge compromise you are doing with our secuirty .

please reply and ask me what is requuired from my side, video or screen shots ?
 
Labels: Needs-Feedback
Hi,

Can you please provide the exact site and CSP configuration? Failing that, a demo which Firefox rejects and Chrome accepts to illustrate the problem will help us work out what is going on, thanks.
yes sure , in half an hour 
Project Member

Comment 3 by sheriffbot@chromium.org, May 23 2018

Cc: dominickn@chromium.org
Labels: -Needs-Feedback
Thank you for providing more feedback. Adding the requester to the cc list.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

The steps i followed was :-

I made a local html page to check CSRF implementation of a site to which i reported bug. 

code was like ( simple form ) :-
<html>
<head>
</head>
<form action="https://**************" method=POST>
<input type="text" name="*********" >
<input type="submit" value="submmit">
</form>
</html>

i performed following tests and got the following surprising behavior that is of concern

Submit the form on my local machine to the remote server directly
tested on chrome on my macbook air ( no CORS or CSP warning ) my request reached server and got rejected from their

i simulated the behavior on jsfiddle.net checked on both my one plus 3t and macbook chrome browser , both allowed me to interact with the target server 

where as the firefox normal as well sa developer edition gave me CSP warning 
for proceeding i got into about:config and disabled CSP to continue testing

You can test via a local form , As the target site is studing my report for their bug , its a bug name in social media so cant disclose it untill responsible disxlosure indication from them

But yes i can give you exact replica if the local host thing wont works for you ,

As i am also too busy with the ongoing bug bounty submissions pending from last week 
sorry for delayed response . will help you as much as i can

regards
arjun sharma


~      
hi
i am online for next two hours ,, can work for you 
let me know what can i do for setting up POC
Labels: Needs-Feedback
Summary: CSP implementation failure (was: CSP implementaion failure)
The POC provided does not contain a CSP directive, and in general, CSP directives do not prevent form submissions *to* a site. Without exact URLs and repro cases, there is nothing actionable in this issue report. 

Chrome keeps bug reports confidential for at least fourteen weeks, so you do not need to delay reporting. 
thanks for that , i can show the exact working on that domain after disclosure 


Project Member

Comment 8 by sheriffbot@chromium.org, May 23 2018

Cc: elawrence@chromium.org
Labels: -Needs-Feedback
Thank you for providing more feedback. Adding the requester to the cc list.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
a dummy that will help in understanding 

different behavior by different browser
Screen Shot 2018-05-23 at 7.10.59 PM.png
131 KB View Download
Screen Shot 2018-05-23 at 7.02.55 PM.png
183 KB View Download
Screen Shot 2018-05-23 at 7.02.33 PM.png
142 KB View Download

Comment 10 Deleted

Unfortunately, no, these screenshots are not especially helpful, as we still don't see any Content-Security-Policy directives. One interesting bit here is that the repro shows the target site in a subframe, for which CSP's Frame-Ancestors directive would be relevant.

It's not clear whether your code that mangles the Getter for the Referrer property is a necessary part of the repro.

We can guess from the Firefox error page that the target site is Twitter.com. Some Twitter CSPs include a frame-ancestors directive with a value of "'self' *":

script-src 'self' https://*.twimg.com https://twitter.com https://ton.twitter.com; frame-ancestors 'self' *; font-src https://twitter.com https://*.twimg.com data: https://ton.twitter.com 'self'; media-src https://twitter.com https://*.twimg.com https://ton.twitter.com blob: 'self'; connect-src https://caps.twitter.com https://cards.twitter.com https://cards-staging.twitter.com https://upload.twitter.com 'self'; style-src https://twitter.com https://*.twimg.com https://ton.twitter.com 'unsafe-inline' 'self'; object-src 'none'; default-src 'self'; frame-src https://twitter.com https://*.twimg.com https://* https://ton.twitter.com 'self'; img-src https://twitter.com https://*.twimg.com data: https://ton.twitter.com blob: 'self'; report-uri https://twitter.com/i/csp_report?a=NVQWGYLXMNQXEZDT&ro=false;

At present, this issue remains unactionable as it does not clearly demonstrate a vulnerability in Chrome.
yes thats twitter i was trying to hide 

yes can you see the case with 

the example that can show you the thing is :-

http://jsfiddle.net/bez3w4ko/111/show/


please do a quick check , as we can go for the main twitter url that i faced , twitter allowed me to public the report content as for now
try this url in all browsers please
Screen Shot 2018-05-24 at 7.05.04 PM.png
94.2 KB View Download
Screen Shot 2018-05-24 at 7.05.31 PM.png
76.3 KB View Download
In Chrome 68, I see the following in the Console when running the repro in a subframe:

Refused to display 'https://twitter.com/login?redirect_after_login=%2Fsettings%2Femail_notifications%2Fupdate' in a frame because an ancestor violates the following Content Security Policy directive: "frame-ancestors 'self'".
mine is Google Chrome 66.0.3359.181 and not showing any error

and 68 isnt available for linux ?
Screen Shot 2018-05-24 at 8.02.42 PM.png
23.5 KB View Download
Screen Shot 2018-05-24 at 8.05.43 PM.png
44.4 KB View Download
I think a lot of systems are still using 68 -- 

I don't fine update for my phone . It's not good dear
I don't fine update for my phone . It's not good dear
can you please tell me about this ?  i think chrome has CSP since 2013 ? correct me if i am wrong 
Chrome 68 is in Canary release on Android. We don't have Canary releases on Linux, but if your example doesn't reproduce in M68 that means it's already fixed and an update will roll out to all users when 68 is released around the end of July.
Alright. Well what was missing and since when ?
In Chrome 66.0.3359.139 on Mac, I also see

Refused to display 'https://twitter.com/settings/email_notifications/update' in a frame because an ancestor violates the following Content Security Policy directive: "frame-ancestors 'self'".

Could you record a video showing what you believe to be unexpected behavior?
yes for sure i will share if you wont give me answers like 

"Chrome 68 is in Canary release on Android. We don't have Canary releases on Linux, but if your example doesn't reproduce in M68 that means it's already fixed and an update will roll out to all users when 68 is released around the end of July."

if i am doing wrong you should explain i will accept 

but the above reply doesnt reflect the chromium group responsible reply 

https://vimeo.com/272220049  password is chromium


Are you looking into this issue ?
The video in #25 doesn't seem to be related to the POC in #12.

In the #25 video, he only difference between Firefox and Chrome that I see is that Firefox's console notes that the X-Frame-Options directive is ignored because there's a CSP Frame-Ancestors policy. I don't see any behavioral difference.

(Chrome ignores the X-Frame-Options directive if a CSP Frame-Ancestors policy is present, but does not show a console notification to that effect).

Unless you can demonstrate that Chrome is failing to enforce a Content-Security-Policy, this issue is invalid.
Status: WontFix (was: Unconfirmed)
It needs more input from me , I am going through csp and other security related http header ..will open the case then

I am disclosing about the incomplete logging as it should be like other browsers that chrome should mention that between x frame option and frame ancestor the later one is to be followed

Thx
Project Member

Comment 30 by sheriffbot@chromium.org, Sep 6

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment