On Thu, Jan 14, 2010 at 1:31 AM, Victor Khimenko <[email protected]> wrote:
> Consider this attack vector: URL file on Desktop. Chrome will be started
> from known directory, now we need to put malicious file there. Hmm. Easy:
> create archive with some valuable data AND file http:/www.google.com (as
> we've dicussed it's valid filename on Linux and MacOS). A lot of users will
> just unpack it on desktop and ignore some strange folder named "http". Then
> they click on URL file and the data from computer is sent to some unknown
> direction.

I'm not really sure where you're going, here.  Why would this be any
different than convincing the user to click on a .html file?  Chrome's
various protections are based on where Chrome is getting the file
from, not on the shape of the URL (if you open a file named
"https://citibank.com";, that file will NOT get the citibank.com secure
cookie, etc).

-scott
-- 
Chromium Developers mailing list: [email protected] 
View archives, change email options, or unsubscribe: 
    http://groups.google.com/group/chromium-dev

Reply via email to