Security: Password auto-complete function vulnerable to Hosts file changes
Reported by
richevil...@gmail.com,
Jun 2 2018
|
|||||
Issue descriptionThis template is ONLY for reporting security bugs. If you are reporting a Download Protection Bypass bug, please use the "Security - Download Protection" template. For all other reports, please use a different template. Please READ THIS FAQ before filing a bug: https://chromium.googlesource.com /chromium/src/+/master/docs/security/faq.md Please see the following link for instructions on filing security bugs: https://www.chromium.org/Home/chromium-security/reporting-security-bugs NOTE: Security bugs are normally made public once a fix has been widely deployed. VULNERABILITY DETAILS Password auto-complete function of Chrome auto fills ID and password on manipulated web site by hosts file modulation. If target victim's hosts file points to hacker's web page, hacker can get their passwords more easily. How-to Hack 1. Manipulate the victim's hosts file. I set "nid.naver.com" (Korea's Big Search Engine site) points to "localhost" 2. Wait the victim clicks ID / PW form or "Submit" button with password that is auto-completed. 3. Hack successful. <File Attached> getpassword_using_hostmani.html - My test web page used for getting password chrome_report_20180602.mp4 - Video shows the process of hacking Sorry for my bad English, if you have more questions about this issue, please contact me whenever you want... VERSION Chrome Version: 67.0.3396.52 (Official Build) + beta (64-bit) Operating System: Windows 10 1803 Build 17134.81 REPRODUCTION CASE Please include a demonstration of the security bug, such as an attached HTML or binary file that reproduces the bug when loaded in Chrome. PLEASE make the file as small as possible and remove any content not required to demonstrate the bug.
,
Jun 2 2018
As you can see on the video, Chrome autofills a password into a http page if it was stored on a https page... And there was an attack that modifies user hosts file or wireless router modify attack on my country, it gave many people damage.. So I reported Chrome auto fills the password even the website is a fake site... Sorry for my English.
,
Jun 5 2018
vabr, nepper: Would you be able to confirm the question about https passwords being autocompleted on http pages?
,
Jun 5 2018
Chrome definitely won't fill a password saved for a HTTPS origin to a frame with a non-secure HTTP version of that origin. I also just tested this with www.cybergrants.com on my machine (GNU/Linux) and Chrome 67.0.3396.62: (1) Save a password on https://www.cybergrants.com (can use the key icon top-left to save even without submitting). (2) Modify /etc/hosts to include: 127.0.0.1 www.cybergrants.com (3) Navigate to http://www.cybergrants.com (4) Nothing is filled and cannot be filled on demand either. A possible explanation of what I see in the video is that Chrome stored credentials for both HTTP and HTTPS versions of that host.
,
Jun 5 2018
vabr: Thanks! richeville703: Can you please check chrome://settings/passwords to see if the http version of the site has the password saved? Aside from that, this is a local attack and is not in Chrome's threat model as described in comment #1, so I'm closing it as WontFix. Please let us know if you have further information and we can reevaluate.
,
Jun 6 2018
meacer: Sorry, I should have checked the stored password list first. There was a password which is for HTTP version (I don't know why this saved on my PC). When I deleted password on HTTP version, the problem demonstrated on the video was not showing. I'm sorry for uploading this false report...
,
Jun 6 2018
Thanks for checking the password list, richeville703!
,
Jun 6 2018
Yes, thanks for confirming!
,
Sep 12
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Nov 29
|
|||||
►
Sign in to add a comment |
|||||
Comment 1 by elawrence@chromium.org
, Jun 2 2018Labels: Security_Impact-Stable OS-Android OS-Chrome OS-Linux OS-Mac OS-Windows
Status: Untriaged (was: Unconfirmed)
Summary: Security: Password auto-complete function vulnerable to Hosts file changes (was: Security: Password auto-complete function auto-filling manipulated web site by Pharming (Hosts file modulation))