BugTraq
Google Chrome: HTTP AUTH Dialog Spoofing through Realm Manipulation (Restated) Aug 23 2010 04:14AM
Aditya K Sood (0kn0ck secniche org) (1 replies)
Re: Google Chrome: HTTP AUTH Dialog Spoofing through Realm Manipulation (Restated) Aug 23 2010 05:35PM
Tim (tim-security sentinelchicken org) (1 replies)
Hi Aditya,

> Google Chrome ( 5.0.375.127 and previous versions) suffers from HTTP
> Auth Dialog spoofing vulnerability due to possible
> realm manipulation in the HTTP header. Previously, Google chrome has got
> a similar bug which can be seen on the following link

How is this significantly different than the issues described in:
http://www.vsecurity.com/download/papers/WeaningTheWebOffOfSessionCookie
s.pdf
?

See the section on page 11 entitled "Weak User Interfaces for HTTP
Authentication"

In your video, I didn't see precisely what realm string was sent or
what the overall auth header was, so it's hard to tell. Also, it may
be that variants of these attacks still work in Firefox.

Note that the above paper was sent to all major browser vendors around
the time that Google was notified about (and fixed) this bug:
http://code.google.com/p/chromium/issues/detail?id=32718

tim

[ reply ]
Re: Google Chrome: HTTP AUTH Dialog Spoofing through Realm Manipulation (Restated) Aug 23 2010 10:22PM
Aditya K Sood (0kn0ck secniche org) (1 replies)
Re: Google Chrome: HTTP AUTH Dialog Spoofing through Realm Manipulation (Restated) Aug 24 2010 12:05AM
Tim (tim-security sentinelchicken org) (1 replies)
Re: Google Chrome: HTTP AUTH Dialog Spoofing through Realm Manipulation (Restated) Aug 24 2010 12:45AM
Aditya K Sood (0kn0ck secniche org)


 

Privacy Statement
Copyright 2010, SecurityFocus