######################################################
Google Chrome Instaled extensions arbitrary detection
Vendor url: http://www.google.com
Advisore:http://lostmon.blogspot.com/2010/09/google-chrome-instaled-extensions.html
Vendor notify:YES vendor confirmed.YES exploit:YES
######################################################
Change log :http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html
#########
Abstract
#########
How safe is use extensions ?
a attacker can access via iframe to resource extensions ( at this moment i
donīt have found a way to altered information from extensions).
like
>iframe
src="chrome-extension://gffjhibehnempbkeheiccaincokdjbfe/options.html"<>/iframe<
for example...
a remote user can modify this web doc and call it with meta tag "base"
in a malformed doc...
so i thnik that chrome-extension need sanitizacion to donīt access internal
resources from external web pages..( file:/// and other protocols handlers
are safe to use and donīt give access to internal resources from external
web docs...)
So chrome-extension protocol handler can be used to get extensions instaled
on client browser...and them if any extension is vulnerable to something
this information can be used for exploit this extension...
In incognito mode Extensions can be detectable too
###########################
A sample PoC of detection
###########################
Chrome extensions detector PoC By Lostmon
####################EOF##########################
##############
Timeline
##############
Discovered:27 may 2010
Vendor notify:01 jun 2010
Vendor patch:02 sep 2010
disclosure: 07 sep 2010
#######################ND ########################
Thnx To Climbo for his patience and support.
Atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Google group: http://groups.google.com/group/lostmon (new)
--
La curiosidad es lo que hace mover la mente....