search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Comodo Chromodo browser with Ad Sanitizer does not enforce same origin policy and is based on an outdated version of Chromium

Vulnerability Note VU#305096

Original Release Date: 2016-02-04 | Last Revised: 2016-02-08

Overview

Comodo Chromodo browser, version 45.8.12.391, and possibly earlier, bundles the Ad Sanitizer extension, version 1.4.0.26, which disables the same origin policy, allowing for the possibility of cross-domain attacks by malicious or compromised web hosts. Chromodo is based on an outdated release of Chromium with known vulnerabilities.

Description

Comodo Chromodo is a web browser that comes packaged with Comodo Internet Security. It is based on Chromium 45.0.2454.93, which was released in September 2015. By default, the browser uses the Ad Sanitizer extension by AdtrustMedia, which disables same origin protections and allows for an attacker to access a victim user's web content from other domains via a specially crafted web page.

According to the original disclosure by the Project Zero team at Google, version 45.8.12.392 was released to address attacks based on the use of execCode. Version 45.8.12.392 appears to remove Ad Sanitizer.

Impact

By convincing a user to visit a specially crafted web page, an attacker can obtain access to web content from another domain.

Solution

The CERT/CC is currently unaware of a practical solution to this problem and recommends the following workarounds.

Disable or remove Ad Sanitizer

Disabling or removing the Ad Sanitizer extension mitigates cross-domain attacks. This can be accomplished by updating to version 45.8.12.392 or through the extensions management interface. For instructions, refer to the Chromodo help page.

Note that disabling Ad Sanitizer does not address known vulnerabilities in the version of Chromium on which Chromodo is based. For this reason, users should prioritize implementing the following workaround.

Discontinue use

Until these issues are addressed, consider discontinuing use of Chromodo.

Vendor Information

305096
 

AdTrustMedia Affected

Updated:  February 05, 2016

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

COMODO Security Solutions, Inc. Affected

Notified:  February 04, 2016 Updated: February 04, 2016

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal 6.5 E:F/RL:U/RC:C
Environmental 1.6 CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

Acknowledgements

The CERT/CC acknowledges Tavis Ormandy of the Project Zero team at Google for disclosing this issue.

This document was written by Joel Land.

Other Information

CVE IDs: None
Date Public: 2016-02-04
Date First Published: 2016-02-04
Date Last Updated: 2016-02-08 19:09 UTC
Document Revision: 16

Sponsored by CISA.