New issue
Advanced search Search tips

Issue 890169 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner: ----
Closed: Sep 28
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux , Android , Windows , Chrome , Mac
Pri: ----
Type: Bug-Security



Sign in to add a comment

Security: Reading Chrome cookies in plaintext without root access

Reported by defaultn...@gmail.com, Sep 28

Issue description


VULNERABILITY DETAILS
An actor with the ability to execute code on a user's machine can read the user's Chrome cookies for any profile in plain text. 

The method uses Chrome's Remote Debugging and Headless Chrome's option to set a user-data-dir.

I understand that it's possible that this is an intended feature of Chrome, just thought I'd let you know anyway.

VERSION
Chrome Version: 59 stable+ 
Operating System: Windows, Linux, OS X (version independent to my knowledge?)

REPRODUCTION CASE
Instructions and proof-of-concept code attached (zip download of a git repo).


 
cookie_crimes-master.zip
4.1 KB Download
Cc: dgozman@chromium.org yangguo@chromium.org pfeldman@chromium.org
Components: Platform>DevTools
Labels: OS-Android OS-Chrome OS-Linux OS-Mac OS-Windows
Thanks for the report. Unfortunately it's very difficult for Chrome to protect against an attacker who has already compromised a machine (see https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Why-arent-physically_local-attacks-in-Chromes-threat-model). But it would be good to verify that the Remote Debugging Protocol isn't inadvertently leaking information it shouldn't.

+some devtools folks - I suspect it's working as intended that the Remote Debugging protocol can see cookies in plaintext via the /json endpoint it accesses?
Cc: skyos...@chromium.org
+skyostil re  http://crbug.com/668932 , which is referenced in the details here.
Status: WontFix (was: Unconfirmed)
Thank you for filing the issue!

I have to say this is working as intended. The remote debugging protocol is meant to provide full access, including cookies, and running Chrome with a flag makes it work.

I am surprised cookies can be read from a headful Chrome profile by the headless Chrome. We have plans to make profiles inter-operable, but that didn't happen yet. Maybe cookies are supported though, I didn't look too close.
Project Member

Comment 4 by sheriffbot@chromium.org, Jan 5

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment