###################################################### Google Chrome Instaled extensions arbitrary detection Vendor url: http://www.google.com Advisore:http://lostmon.blogspot.com/2010/09/google-chrome-instaled-extensions.html Vendor notify:YES vendor confirmed.YES exploit:YES ###################################################### Change log :http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html ######### Abstract ######### How safe is use extensions ? a attacker can access via iframe to resource extensions ( at this moment i donīt have found a way to altered information from extensions). like >iframe src="chrome-extension://gffjhibehnempbkeheiccaincokdjbfe/options.html"<>/iframe< for example... a remote user can modify this web doc and call it with meta tag "base" in a malformed doc... so i thnik that chrome-extension need sanitizacion to donīt access internal resources from external web pages..( file:/// and other protocols handlers are safe to use and donīt give access to internal resources from external web docs...) So chrome-extension protocol handler can be used to get extensions instaled on client browser...and them if any extension is vulnerable to something this information can be used for exploit this extension... In incognito mode Extensions can be detectable too ########################### A sample PoC of detection ########################### Chrome extensions detector PoC By Lostmon

####################EOF########################## ############## Timeline ############## Discovered:27 may 2010 Vendor notify:01 jun 2010 Vendor patch:02 sep 2010 disclosure: 07 sep 2010 #######################€ND ######################## Thnx To Climbo for his patience and support. Atentamente: Lostmon (lostmon@gmail.com) Web-Blog: http://lostmon.blogspot.com/ Google group: http://groups.google.com/group/lostmon (new) -- La curiosidad es lo que hace mover la mente....