Skip to content

Commit 68eb640

Browse files
committed
feat(readme): update READMEs
1 parent 7d60103 commit 68eb640

File tree

4 files changed

+51
-53
lines changed

4 files changed

+51
-53
lines changed

README.md

+5-33
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929

3030
> You can extract `js-vuln-db` CVEs to `.html/.js` files using [Scripts](#scripts)
3131
32-
> Demo: https://uxss-db.now.sh
32+
> Demo(sometimes down): https://uxss-db.now.sh
3333
3434
## Intro
3535

@@ -47,7 +47,7 @@ _Version field has "?" symbol, if a version wasn't attached to the report_
4747

4848
**NOTE: Many CVEs aren't listed in the tables below!**
4949

50-
*Check `/other` folder = unsorted/unknown/duplicated CVEs and CVEs for less popular browsers*
50+
*Check `/other` folder = unsorted/unknown/duplicated CVEs and vulnerabilities for less popular browsers*
5151

5252
## Webkit
5353

@@ -176,13 +176,7 @@ _Version field has "?" symbol, if a version wasn't attached to the report_
176176

177177
* [How Chromium Displays Web Pages](https://www.chromium.org/developers/design-documents/displaying-a-web-page-in-chrome)
178178
* [Chromium: Multi-process Architecture](https://www.chromium.org/developers/design-documents/multi-process-architecture)
179-
* [Plz Navigate: Browser-side navigation in Chrome](https://docs.google.com/document/d/1cSW8fpJIUnibQKU8TMwLE5VxYZPh4u4LNu_wtkok8UE/edit?pref=2&pli=1#)
180-
* [PlzNavigate: Navigation failure](https://docs.google.com/document/d/1AD1gkOO9yTuNwnNptczdlMgktoMdl0LssDbv1ECx5Co/edit#heading=h.8e8hcr1fxzjg)
181-
* [PlzNavigate: Speculative renderer creation](https://docs.google.com/document/d/1d3NhCFK79imXBO_S-qN16XYLS1zC5hkvL7nQclxnKP8/edit#heading=h.vno6gjwj078r)
182179
* [Site Isolation Design Document](https://www.chromium.org/developers/design-documents/site-isolation)
183-
* [Site Isolation Summit - Chromium Changes](https://docs.google.com/presentation/d/1e25K7BW3etNDm1-lkMltMcCcRDeVwLibBcbACRhqZ1k/edit#slide=id.g6ddda684b_09)
184-
* [Site Isolation Summit 2015](https://docs.google.com/presentation/d/10HTTK4dsxO5p6FcpEOq8EkuV4yiBx2n6dBki8cqDWyo/edit#slide=id.g6ddc3db7f_050)
185-
* [Site Isolation Summit - Blink Changes](https://docs.google.com/presentation/d/11nrXiuXBTC72E5l_MUtu2eJN6rcW9PtBewDOPPTk9Bc/edit#slide=id.g6dded9be5_073)
186180
* [Threading and Tasks in Chrome](https://chromium.googlesource.com/chromium/src/+/master/docs/threading_and_tasks.md)
187181
* [Important Abstractions and Data Structures](https://www.chromium.org/developers/coding-style/important-abstractions-and-data-structures)
188182

@@ -209,12 +203,13 @@ _Version field has "?" symbol, if a version wasn't attached to the report_
209203
## Misc
210204

211205
* [NodeFuzz](https://code.google.com/archive/p/ouspg/wikis/NodeFuzz.wiki) - web browser fuzzer
212-
* [Muon](https://github.com/brave/muon) - Build browsers and browser like applications with HTML, CSS, and JavaScript
206+
* [brave/Muon](https://github.com/brave/muon) - Build browsers and browser like applications with HTML, CSS, and JavaScript (part of the Brave's bug bounty)
213207
* https://ios.browsr-tests.com - list of SOP bypasses in iOS
214208
* https://github.com/rafaybaloch/SOP-Bypass-Mini-Test-Suite - list of SOP bypasses
215209
* [ref_fuzz](https://lcamtuf.blogspot.com/2010/06/announcing-reffuzz-2yo-fuzzer.html) fuzzer - [source code](http://lcamtuf.coredump.cx/ref_fuzz5.html)
216210
* [javascript - Ways to circumvent the same-origin policy - Stack Overflow](https://stackoverflow.com/questions/3076414/ways-to-circumvent-the-same-origin-policy) - document.domain, window.postMessage, CORS, reverse proxy( + jsonp)
217211
* Slides about cookie security - [Cookie same origin policy](https://crypto.stanford.edu/cs142/lectures/10-cookie-security.pdf)
212+
* [PortSwigger/hackability](https://github.com/PortSwigger/hackability) - "Devtools" for browser security. (useful for less known browsers)
218213

219214

220215
## Scripts
@@ -236,11 +231,7 @@ MIT
236231

237232
## TODO
238233

239-
* RESOLVE THESE LINKS AND START USING ISSUES!
240-
* Introduce unified way to trigger exploit where it's possible: `window.onclick` / `<button id="X">Click me</button>`
241-
* Add "Firefox" table in `README.md`
242234
* Add these bugs:
243-
* https://blog.jeremiahgrossman.com/2006/08/i-know-where-youve-been.html
244235
* [Pwn2Own: content: scheme allows cross-origin info leaks](https://bugs.chromium.org/p/chromium/issues/detail?id=659489)
245236
* [Use-after free in leveldb](https://bugs.chromium.org/p/chromium/issues/detail?id=88944)
246237
* [Security: UaF in MidiHost round 2 (JS -> Browser code execution)](https://bugs.chromium.org/p/chromium/issues/detail?id=576383)
@@ -254,7 +245,6 @@ MIT
254245
* http://unsafe.cracking.com.ar/demos/edgedatametadata/bing.html
255246
* [CVE-2016-9079: Use-after-free in SVG Animation](https://bugzilla.mozilla.org/show_bug.cgi?id=1321066)
256247
* https://bugs.chromium.org/p/chromium/issues/detail?id=666246
257-
* https://trac.torproject.org/projects/tor/ticket/20772
258248
* http://www.cracking.com.ar/demos/workerleak/
259249
* http://www.cracking.com.ar/demos/xmldom/
260250
* http://unsafe.cracking.com.ar/demos/sandboxedge/
@@ -263,33 +253,15 @@ MIT
263253
* http://browser-shredders.blogspot.com/2014/06/cve-not-yet-assigned-opera-coast-ssl.html
264254
* [Bypassing the Same Origin Policy - The Browser Hacker&rsquo;s Handbook (2014)](http://apprize.info/security/browser/5.html)
265255
* [438085 - Security: SOP bypass via DNS-Rebind (including PoC) - chromium - Monorail](https://bugs.chromium.org/p/chromium/issues/detail?id=438085)
266-
* [Chrome XSS Bypass - Brute XSS](https://brutelogic.com.br/blog/chrome-xss-bypass/)
267256
* [same origin policy problems](http://www.securitylearn.net/tag/same-origin-policy-problems/)
268257
* [demonic_browsers.pdf](https://research.aurainfosec.io/assets/demonic_browsers.pdf)
269258
* [lcamtuf's blog: Yeah, about that address bar thing...](https://lcamtuf.blogspot.com/2010/06/yeah-about-that-address-bar-thing.html)
270-
* [Multiple Browsers Fake url folder & file Same origin Spoof](http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html)
271-
* [lcamtuf's blog: The curse of inverse strokejacking](https://lcamtuf.blogspot.com/2010/06/curse-of-inverse-strokejacking.html)
272-
* [lcamtuf.coredump.cx/webkit-focus/](http://lcamtuf.coredump.cx/webkit-focus/)
273-
* [lcamtuf's blog: Safari: a tale of betrayal and revenge](https://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html)
274259
* [Full Disclosure: ...because you can't get enough of clickjacking](http://seclists.org/fulldisclosure/2010/Mar/232)
275260
* [JSON hijacking for the modern web | Blog](https://portswigger.net/blog/json-hijacking-for-the-modern-web)
276-
* [portswigger-labs.net/jsproxy/edge_proxy_undefined_variable_read/](http://portswigger-labs.net/jsproxy/edge_proxy_undefined_variable_read/)
277-
* [portswigger-labs.net/jsproxy/edge_proxy_undefined_variable_read/index2.html](http://portswigger-labs.net/jsproxy/edge_proxy_undefined_variable_read/index2.html)
278-
* [portswigger-labs.net/utf-16be/edge_steal_json_data_with_proxy/index2.php](http://portswigger-labs.net/utf-16be/edge_steal_json_data_with_proxy/index2.php)
279-
* [portswigger-labs.net/utf-16be/chrome_steal_json_data_with_proxy/index2.html](http://portswigger-labs.net/utf-16be/chrome_steal_json_data_with_proxy/index2.html)
280-
* [portswigger-labs.net/utf-16be/safari_steal_json_data_with_proxy/](http://portswigger-labs.net/utf-16be/safari_steal_json_data_with_proxy/)
281-
* [portswigger-labs.net/utf-16be/without_proxies/](http://portswigger-labs.net/utf-16be/without_proxies/)
282-
* [portswigger-labs.net/edge_steal_multiple_undefined_variables/](http://portswigger-labs.net/edge_steal_multiple_undefined_variables/)
283-
* [Bypass Same Origin Policy](http://qnimate.com/same-origin-policy-in-nutshell/)
284-
* [Continued Adventures with iOS UIWebViews](https://labs.mwrinfosecurity.com/blog/continued-adventures-with-ios-uiwebviews/)
285-
* [WebView addJavascriptInterface Remote Code Execution](https://labs.mwrinfosecurity.com/blog/webview-addjavascriptinterface-remote-code-execution/)
286261
* [Pwnfest 2016 meta bug](https://bugs.chromium.org/p/chromium/issues/detail?id=664551)
287-
* [Full Disclosure: ...because you can't get enough of clickjacking](http://seclists.org/fulldisclosure/2010/Mar/232)
288-
* [Apple Safari SOP bypass (CVE-2015-3753)](http://blog.intothesymmetry.com/2015/08/apple-safari-sop-bypass-cve-2015-3753.html)
289262
* format webkit/CVE-2018-4204/README.md
290263
* missing exploit for `webkit/CVE-2013-7197`
291264
* https://bugs.chromium.org/p/chromium/issues/detail?id=439730
292-
* https://bugs.chromium.org/p/chromium/issues/detail?id=711020
293265
* https://bugs.chromium.org/p/chromium/issues/detail?id=682020
294266
* https://bugs.chromium.org/p/chromium/issues/detail?id=668724
295-
* https://bugs.chromium.org/p/chromium/issues/detail?id=669086
267+
* https://blog.jeremiahgrossman.com/2006/08/i-know-where-youve-been.html - that web 1.0 thing

chrome/README.md

+42
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
# Chrome: known problems
2+
3+
---------------------------------------------
4+
5+
## Security: Omnibox drop target enables navigation to restricted URLs
6+
7+
> Reported by [email protected], Sep 17 2012
8+
9+
## Details
10+
11+
We started stripping javascript: from any text pasted or dragged into the address bar, but this happens after checking for other malicious patterns. Compare:
12+
13+
``` html
14+
15+
data:text/html,<a href='chrome://inducebrowsercrashforrealz'>drag me into the address bar first</a>, <a href='javascript:chrome://inducebrowsercrashforrealz'>try me next</a>
16+
17+
```
18+
19+
Not sure if this matters in practice, but seems like a simple fix, so creating a bug just in case.
20+
21+
Link: https://bugs.chromium.org/p/chromium/issues/detail?id=149877
22+
23+
---------------------------------------------
24+
25+
http://lcamtuf.coredump.cx/whack/ - cross-browser :(
26+
27+
28+
---------------------------------------------
29+
30+
## Security: XSS by ServiceWorker for domains hosting arbitrary content, even in sandboxes
31+
32+
### VULNERABILITY DETAILS
33+
34+
ServiceWorker can turn previously unexploitable xss bugs into serious vulnerabilities :-(
35+
36+
As an example I've attached a simple script that installs a ServiceWorker on the Dropbox storage domain. This only uses an XSS on the *sandbox domain* of Dropbox, which was previously unexploitable. That ServiceWorker can then sniff traffic and steal the user's files as they are accessed.
37+
38+
Serving user files from a separate sandbox domain with no cookies used to be relatively safe, and many sites assume that it still is safe, to the point where they will serve both HTML and 'text/javascript' files from the same domain.
39+
40+
Ideally there would be some kind of opt-in mechanism for this; the available opt-out mechanism is hard to implement (rejecting 'Service-Worker: script' might be tricky with a caching CDN).
41+
42+
Link: https://bugs.chromium.org/p/chromium/issues/detail?id=439730

chrome/known-problems.md

-20
This file was deleted.

webkit/README.md

+4
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
# Webkit
2+
3+
* [lcamtuf: The curse of inverse strokejacking](https://lcamtuf.blogspot.com/2010/06/curse-of-inverse-strokejacking.html)
4+
* [lcamtuf: Safari: a tale of betrayal and revenge](https://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html)

0 commit comments

Comments
 (0)