New issue
Advanced search Search tips
Starred by 4 users
Status: Fixed
Owner:
Closed: Jan 2017
Cc:



Sign in to add a comment
Adobe: Adobe Acrobat Force-Installed Vulnerable Chrome Extension
Project Member Reported by taviso@google.com, Jan 18 2017 Back to list
On January 12th, an automatic Adobe Acrobat update force installed a new chrome extension with ID efaidnbmnnnibpcajpcglclefindmkaj. You can view it on the Chrome Webstore here: https://chrome.google.com/webstore/detail/adobe-acrobat/efaidnbmnnnibpcajpcglclefindmkaj/

I can see from the webstore statistics it's already got ~30M installations. 

It didn't take long to notice there's a DOM XSS in data/js/frame.html

531         } else if (request.current_status === "failure") {
532             analytics(events.TREFOIL_HTML_CONVERT_FAILED);
533             if (request.message) {
534                 str_status = request.message;
535             }
536             success = false;

Presumably you can do

window.open("chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/data/js/frame.html?message=" + encodeURIComponent(JSON.stringify({
        panel_op: "status",
        current_status: "failure",
        message: "<h1>hello</h1>"
})));

I think CSP might make it impossible to jump straight to script execution, but you can iframe non web_accessible_resources, and easily pivot that to code execution, or change privacy options via options.html, etc.

I've also noticed the way they've designed the "to_html" RPC seems racy, the url of a tab might change (because an attacker can do x = window.open(); x.location = "new location"). Right now I don't think you can do very much with it because it doesn't seem to be feature complete...but still, it seems worth noting this so it doesn't introduce a vulnerability when they enable it.



This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without a broadly available patch, then the bug report will automatically
become visible to the public.

 
Project Member Comment 1 by taviso@google.com, Jan 18 2017
PSIRT-6264

Response:

Hi Tavis,

Thanks again for contacting us about this bug.  We're planning an update that we expect will land next week.

We'll circle back with you on Tuesday with a more precise timeframe.


Project Member Comment 2 by taviso@google.com, Jan 18 2017
Labels: -Restrict-View-Commit
Status: Fixed
Response:

Hi Tavis,

Thanks again for contacting us about this xss bug.  We pushed a fix yesterday and it looks like the new version is live now.  What is your expectation around notification to users?

Regards,

Project Member Comment 3 by mjurczyk@google.com, Feb 3 2017
Labels: -Reported-12-Jan-2017 Reported-2017-Jan-12
Comment 4 Deleted
Sign in to add a comment