Loading HuntDB...

`alert()` dialogs on `chrome-extension://` origin (internal pages)

Low
B
Brave Software
Submitted None
Reported by metnew

Vulnerability Details

Technical details and impact analysis

## Summary: Navigation to `chrome-extension` from the web is possible with #378805 (`ftp://` -> `chrome-extension://`). A blank page is created during navigation to `chrome-extension://` origin. Blank pages have "This page" title. It's possible to initiate `alert()` with a social-engineering content and "This page" title, that will be displayed on internal pages. ## Products affected: Brave: 0.23.31 V8: 6.7.288.46 rev: 3148acef36dba0fce89108638bb27927c4937f90 Muon: 7.1.5 OS Release: 17.6.0 Update Channel: Release OS Architecture: x64 OS Platform: macOS Node.js: 7.9.0 Brave Sync: v1.4.2 libchromiumcontent: 67.0.3396.103 ## Steps To Reproduce: 1. Start ftp server (sample ftp server attached, `npm i ftpd && node ftp-server.js`) 2. Open `ftp://localhost:7002/exploit.html` 3. Click "Go to payment settings" 4. Alert dialog with title "This page" will be displayed on `about:preferences#payments` page > And `ftp://localhost:7002/exploit.html` is blank, non-responsive and can't be reloaded. > adjust timer in `exploit.html` if it doesn't work ## Impact An attacker could initiate `alert()` with a social-engineering content and "This page" title, that will be displayed on internal pages.

Report Details

Additional information and metadata

State

Closed

Substate

Duplicate

Submitted