GithubHelp home page GithubHelp logo

anthrax3 / no-sandbox Goto Github PK

View Code? Open in Web Editor NEW

This project forked from sickcodes/no-sandbox

0.0 1.0 0.0 194 KB

No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/

Home Page: https://no-sandbox.io/

License: GNU General Public License v3.0

no-sandbox's Introduction

No Sandbox

"Applications That Run Chromium Without The Sandbox"

Chrome Sandbox

Page: https://no-sandbox.io/

Project: https://github.com/sickcodes/no-sandbox

Twitter: https://twitter.com/sickcodes

The Chrome browser uses a sandbox.

The sandbox status page is found in all Chromium based and Chrome applications:

chrome://sandbox

See your Chrome sandbox status: chrome://sandbox/

Chrome Sandbox

(Right click, copy paste URL: Chrome won't even let you hyperlink to that page!)

Danger

A Chromium based javascript exploit can potentially affect every single downstream application that is built using the Chromium engine.

List of almost daily exploits that affect Chromium based applications.

Chrome: https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=chrome

Chromium: https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=chromium

When the sandbox is disabled using the flag option --no-sandbox, websites or rendered pages can potentially execute malicious Javascript based exploits on your computer.

This exposes the user to Remote Code Execution (RCE) exploits that can execute arbitrary code on your computer.

Inside of regular Chrome, where the sandbox is enabled, this is much harder to achieve, unless the attacker combines this with a "sandbox escape" vulnerability.

However, since a while ago, many applications have decided to put Applications inside of the Web Browser.

One such application that uses the --no-sandbox flag is nodejs.

Node is a back-end Javascript runtime framework.

However, one such front-end framework built with nodejs is a popular appliation framework named Electron.

Electron

"desktop applications ... always trusted"?

As per their Documentation, they clearly outline the risks involved with running Electron Applications.

https://www.electronjs.org/docs/api/sandbox-option

One of the key security features of Chromium is that all blink rendering/JavaScript code is executed within a sandbox. This sandbox uses OS-specific features to ensure that exploits in the renderer process cannot harm the system.

Usually this is not a problem for desktop applications since the code is always trusted, but it makes Electron less secure than Chromium for displaying untrusted web content.

The last sentence is quite a statement.


Applications that use the --no-sandbox flag when running Chromium and Chrome based Applications and may expose users to RCE vulnerabilities:

Are we missing any apps? Please submit a Pull Request on the sickcodes/no-sandbox GitHub repo

Official Application List: https://www.electronjs.org/apps

App Sandbox Built With Source Desktop Platforms Risks Other Examples
Slack Enabled Electron Closed Source Windows, macOS, Linux Untrusted desktop application without source code, but sandbox enabled. 2020-09-28 XSS to HTML injection RCE
Twitch DISABLED Electron Closed Source Windows, macOS Untrusted desktop application without source code
VSCode DISABLED Electron https://github.com/microsoft/vscode Windows, macOS, Linux Untrusted VSCode extensions can execute malicious code on your computer. ZDNet: Malicious extensions, CVE-2020-17023 package.json RCE, CVE-2020-17022 Image based RCE
Signal DISABLED Electron https://github.com/signalapp/Signal-Desktop Windows, macOS, Linux A JavaScript based exploit would lead to RCE
FB Messenger DISABLED Electron Closed Source Windows Any JS based exploit would lead to RCE.
Microsoft Teams DISABLED Electron Closed Source Windows, macOS Untrusted desktop application without source code.
Keybase DISABLED Electron https://github.com/keybase/client Windows, macOS, Linux A JavaScript based exploit would lead to RCE
Discord DISABLED Electron Closed Source Windows, macOS, Linux Untrusted desktop application without source code. A JavaScript based exploit would lead to RCE

no-sandbox's People

Contributors

mchelen avatar sickcodes avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.