$3,000 Bounty: RCE in Burp Suite via Clickjacking
研究者发现Burp Suite因使用无头Chrome并启用未认证的远程调试端口存在RCE漏洞。攻击者可利用JS扫描技巧获取调试端口并实施点击劫持,在目标机器上执行任意系统命令。 2025-5-15 04:55:8 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

From Click to Command: $3,000 RCE in Burp Suite via Chrome Debug Port

Monika sharma

Summary

In a brilliant attack chain combining Chrome internals Java behavior and UI tricks researcher mattaustin discovered a remote code execution (RCE) vulnerability in Burp Suite. The vulnerability exploits the way Burp Suite’s embedded headless Chrome scanner enables remote debugging allowing attackers to clickjack their way into executing arbitrary OS commands on the host machine. Yes including launching the Calculator app on a Mac.

Let’s dive into how this was achieved and why it matters.

Root Cause

When Burp launches a Chrome instance for its scanner or crawler it does so in headless mode with the remote debugging port flag enabled. This allows automation and introspection of the browser via a WebSocket interface.

However, Chrome’s remote debugging port is:

  • Randomized per instance
  • Publicly accessible on localhost
  • Not protected by authentication

The researcher combined this with:

  • A known JavaScript port scanning trick to discover which port Chrome is listening on

文章来源: https://infosecwriteups.com/3-000-bounty-rce-in-burp-suite-via-clickjacking-3a3bac7cf431?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh