🔓 Google Sans Ligature Spoofing

Proof of Concept Suite - Critical Unfixed Surfaces

⚠️ SECURITY RESEARCH ONLY

This PoC suite is for authorized security research and testing only. Do not use against real users or systems you don't own. Report findings responsibly to Chromium security team.

About This Vulnerability

CVE Status: Partially fixed (CL 7536052)

Fix Coverage: ~23% (permission prompts only)

Unfixed Surfaces: 27+ UI surfaces remain vulnerable

Severity: CRITICAL (S2) - Credential theft, financial fraud, identity theft


What's the issue?

The Google Sans font contains special ligatures that render strings like "googlelogoligature" as the Google logo. When these strings appear in domain names, Chrome displays them as the logo in various UI surfaces, allowing attackers to spoof Google's origin.


What was fixed?

CL 7536052 disabled ligatures in permission prompts (camera, microphone, location, etc.) on Android.


What remains vulnerable?

The 7 critical surfaces demonstrated in this PoC suite, plus 20+ other surfaces.

7
Critical PoCs
27+
Unfixed Surfaces
~2B
Affected Users
23%
Fix Coverage

Select a Proof of Concept:

Testing Instructions

  1. Ensure DNS is configured to point googlelogoligature.com to this server
  2. Accept HTTPS certificate warning (if using self-signed cert)
  3. Click on any PoC card above to test that surface
  4. Follow the on-page instructions for each PoC
  5. Take screenshots of the spoofed origin display
  6. Check browser console for detailed logging
  7. Review captured data in the yellow boxes on each page

What to look for:

Reporting

After testing, report findings to: