On Thu, Jan 14, 2010 at 5:38 PM, Scott Hess <[email protected]> wrote:
> On Thu, Jan 14, 2010 at 1:31 AM, Victor Khimenko <[email protected]> wrote: > > Consider this attack vector: URL file on Desktop. Chrome will be started > > from known directory, now we need to put malicious file there. Hmm. Easy: > > create archive with some valuable data AND file http:/www.google.com (as > > we've dicussed it's valid filename on Linux and MacOS). A lot of users > will > > just unpack it on desktop and ignore some strange folder named "http". > Then > > they click on URL file and the data from computer is sent to some unknown > > direction. > > I'm not really sure where you're going, here. Why would this be any > different than convincing the user to click on a .html file? It's different because user is hosed when he clicks CORRECT AND VALID file - at least the file which was correct and valid some time in the past. User DOES NOT click on the malicious http folder - he uses the same citibank link he always used. It the same as difference between NULL dereference and uninitialized variable - in first case problem is immediately obvious, in the the second one between error point and disaster there are millions of commands so it's not easy to see the connection. > Chrome's various protections are based on where Chrome is getting the > file from, not on the shape of the URL (if you open a file named > "https://citibank.com", that file will NOT get the citibank.comsecure cookie, > etc). > > Of course not - but if you'll open the file https://citibank.com it still can do a lot of stuff to your account. It's not the end of world, but it's not a trivial matter either. There are no separate domain for file named http:/citibank.com and for file named ../.ssh/identity :-) Of course there are other security measures which will hopefully save ../.ssh/identity file, but it does not mean we are free to ignore this threat.
-- Chromium Developers mailing list: [email protected] View archives, change email options, or unsubscribe: http://groups.google.com/group/chromium-dev
