• Stars
    star
    179
  • Rank 214,039 (Top 5 %)
  • Language
  • License
    GNU General Publi...
  • Created over 3 years ago
  • Updated over 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/

No Sandbox

"Applications That Run Chromium Without The Sandbox"

Chrome Sandbox

Page: https://no-sandbox.io/

Project: https://github.com/sickcodes/no-sandbox

Twitter: https://twitter.com/sickcodes

The Chrome browser uses a sandbox.

The sandbox status page is found in all Chromium based and Chrome applications:

chrome://sandbox

See your Chrome sandbox status: chrome://sandbox/

Chrome Sandbox

(Right click, copy paste URL: Chrome won't even let you hyperlink to that page!)

Danger

A Chromium based javascript exploit can potentially affect every single downstream application that is built using the Chromium engine.

List of almost daily exploits that affect Chromium based applications.

Chrome: https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=chrome

Chromium: https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=chromium

When the sandbox is disabled using the flag option --no-sandbox, websites or rendered pages can potentially execute malicious Javascript based exploits on your computer.

This exposes the user to Remote Code Execution (RCE) exploits that can execute arbitrary code on your computer.

Inside of regular Chrome, where the sandbox is enabled, this is much harder to achieve, unless the attacker combines this with a "sandbox escape" vulnerability.

However, since a while ago, many applications have decided to put Applications inside of the Web Browser.

One such application that uses the --no-sandbox flag is nodejs.

Node is a back-end Javascript runtime framework.

However, one such front-end framework built with nodejs is a popular appliation framework named Electron.

Electron

"desktop applications ... always trusted"?

As per their Documentation, they clearly outline the risks involved with running Electron Applications.

https://www.electronjs.org/docs/api/sandbox-option

One of the key security features of Chromium is that all blink rendering/JavaScript code is executed within a sandbox. This sandbox uses OS-specific features to ensure that exploits in the renderer process cannot harm the system.

Usually this is not a problem for desktop applications since the code is always trusted, but it makes Electron less secure than Chromium for displaying untrusted web content.

The last sentence is quite a statement.


Applications that use the --no-sandbox flag when running Chromium and Chrome based Applications and may expose users to RCE vulnerabilities:

Are we missing any apps? Please submit a Pull Request on the sickcodes/no-sandbox GitHub repo

Official Application List: https://www.electronjs.org/apps

App Sandbox Built With Source Desktop Platforms Risks Other Examples
Slack Enabled Electron Closed Source Windows, macOS, Linux Untrusted desktop application without source code, but sandbox enabled. 2020-09-28 XSS to HTML injection RCE
Twitch DISABLED Electron Closed Source Windows, macOS Untrusted desktop application without source code
VSCode DISABLED Electron https://github.com/microsoft/vscode Windows, macOS, Linux Untrusted VSCode extensions can execute malicious code on your computer. ZDNet: Malicious extensions, CVE-2020-17023 package.json RCE, CVE-2020-17022 Image based RCE
Signal DISABLED Electron https://github.com/signalapp/Signal-Desktop Windows, macOS, Linux A JavaScript based exploit would lead to RCE
FB Messenger DISABLED Electron Closed Source Windows Any JS based exploit would lead to RCE.
Microsoft Teams DISABLED Electron Closed Source Windows, macOS Untrusted desktop application without source code.
Keybase DISABLED Electron https://github.com/keybase/client Windows, macOS, Linux A JavaScript based exploit would lead to RCE
Discord DISABLED Electron Closed Source Windows, macOS, Linux Untrusted desktop application without source code. A JavaScript based exploit would lead to RCE
WeChat DISABLED Electron Closed Source Windows Untrusted desktop application without source code. 2021-04-20 Recent Chromium bug used to attack Chinese WeChat users

More Repositories

1

Docker-OSX

Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.
Shell
31,005
star
2

osx-serial-generator

Mac Serial Generator - Generate complete sets of Serial Numbers for OSX-KVM, Docker-OSX and of course, OpenCore.
Shell
1,456
star
3

osx-optimizer

OSX Optimizer: Optimize MacOS - Shell scripts to speed up your mac boot time, accelerate loading, and prevent unnecessary throttling.
Shell
1,455
star
4

dock-droid

Docker Android - Run QEMU Android in a Docker! X11 Forwarding! CI/CD for Android!
Dockerfile
1,052
star
5

Docker-eyeOS

Run iPhone (xnu-arm64) in a Docker container! Supports KVM + iOS kernel debugging (GDB)! Run xnu-qemu-arm64 in Docker! Works on ANY device.
Shell
702
star
6

droid-native

Next Generation Android x86 Desktop - Anbox, Lineage, WayDroid, BlissOS, Dock-Droid
Shell
132
star
7

security

Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.
Shell
70
star
8

Droid-NDK-Extractor

Android NDK Extractor - Extract ARM native bridge libndk translation libraries for use in any Android derivative.
Shell
46
star
9

adb-download-all

ADB Download All Files - A dirty shell script to adb pull all readable files using adb pull & base64
Shell
26
star
10

anbox-modules-dkms

anbox-modules-dkms for kernel - resurrected aur.archlinux.org/anbox-modules-dkms for ongoing maintaining. Next Generation Box Modules DKMS (ngbox). WayDroid, Anbox Halium, Droid Native, Dock Droid + BlissOS!
Shell
24
star
11

xdotool-gui

GUI for command-line X11 automation tool
Python
20
star
12

bulk-whois

Magical Bulk Whois (No CAPTCHA!) 🪄🪄🪄🪄🪄🚀🚀🚀🚀🚀
Shell
14
star
13

Docker-iOS

Run iPhone (iOS) in a Docker container! Supports KVM + kernel debugging! Run xnu-qemu-arm64 in Docker! Works on ANY device.
12
star
14

aur

Sick Codes AUR Packages
Shell
8
star
15

sickcodes

Sick Codes Projects - Security Researcher | Freelance Developer | Open Source
7
star
16

arduino-dark-theme

A very dark arduino theme for late night night board building
Shell
7
star
17

qnx-modules

QNX FileSystem Kernel Modules (qnx-modules-dkms)
C
6
star
18

autodiscover

PGP Signed Statement of Intent Regarding autodiscover.TLD
5
star
19

pgp

Sick Codes Public PGP Key
3
star
20

linux-binderash

Linux Binderash - Arch Linux Kernel Builds for ashmem & binder(fs) builds for the AUR.
Shell
1
star
21

linux-git

AUR linux-git: mainline bleeding edge Kernel Builds for Arch Linux https://aur.archlinux.org/pkgbase/linux-git
Shell
1
star