{"vuid":"VU#305096","idnumber":"305096","name":"Comodo Chromodo browser with Ad Sanitizer does not enforce same origin policy and is based on an outdated version of Chromium","keywords":["comodo","chromodo","same origin policy","cross-domain"],"overview":"Comodo Chromodo browser, version 45.8.12.391, and possibly earlier, bundles the Ad Sanitizer extension, version 1.4.0.26, which disables the same origin policy, allowing for the possibility of cross-domain attacks by malicious or compromised web hosts. Chromodo is based on an outdated release of Chromium with known vulnerabilities.","clean_desc":"Comodo Chromodo is a web browser that comes packaged with Comodo Internet Security. It is based on Chromium 45.0.2454.93, which was released in September 2015. By default, the browser uses the Ad Sanitizer extension by AdtrustMedia, which disables same origin protections and allows for an attacker to access a victim user's web content from other domains via a specially crafted web page. According to the original disclosure by the Project Zero team at Google, version 45.8.12.392 was released to address attacks based on the use of execCode. Version 45.8.12.392 appears to remove Ad Sanitizer.","impact":"By convincing a user to visit a specially crafted web page, an attacker can obtain access to web content from another domain.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem and recommends the following workarounds.","workarounds":"Disable or remove Ad Sanitizer Disabling or removing the Ad Sanitizer extension mitigates cross-domain attacks. This can be accomplished by updating to version 45.8.12.392 or through the extensions management interface. For instructions, refer to the Chromodo help page. Note that disabling Ad Sanitizer does not address known vulnerabilities in the version of Chromium on which Chromodo is based. For this reason, users should prioritize implementing the following workaround. Discontinue use Until these issues are addressed, consider discontinuing use of Chromodo.","sysaffected":"","thanks":"The CERT/CC acknowledges Tavis Ormandy of the Project Zero team at Google for disclosing this issue.","author":"This document was written by Joel Land.","public":["https://code.google.com/p/google-security-research/issues/detail?id=704","https://code.google.com/p/google-security-research/issues/attachmentText?id=704&aid=7040001000&name=exploit.html&token=ABZ6GAfUyycnO1UhdZ369lvGVlxdWMfS0Q%3A1454598007839","https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy","https://help.comodo.com/topic-249-1-593-6760-.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2016-02-04T14:13:13Z","publicdate":"2016-02-04T00:00:00Z","datefirstpublished":"2016-02-04T19:07:37Z","dateupdated":"2016-02-08T19:09:19Z","revision":16,"vrda_d1_directreport":"0","vrda_d1_population":"1","vrda_d1_impact":"4","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.8","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","cvss_temporalscore":"6.5","cvss_environmentalscore":"1.62030477452813","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}