Looking for the vulnerability index of Invicti's legacy products?
Chrome Logger information disclosure - Vulnerability Database

Chrome Logger information disclosure

Description

Chrome Logger is a debugging tool consisting of a browser extension and server-side component that enables developers to view server-side application logs directly in the Chrome browser console. When active, the server returns debugging data through HTTP response headers (X-ChromePhp-Data or X-ChromeLogger-Data) containing base64-encoded JSON with application state, variables, and log messages. This vulnerability occurs when Chrome Logger remains enabled in production environments, exposing internal application details to any client inspecting HTTP responses.

Remediation

Disable Chrome Logger and all debugging tools in production environments immediately. Implement the following steps:

1. Remove or disable the Chrome Logger server-side library from production code. For PHP applications using ChromePhp:

// Remove or comment out in production
// ChromePhp::log('debug message');
// require_once 'ChromePhp.php';
2. Configure environment-based conditional loading to ensure debugging tools only activate in development:
if (getenv('APP_ENV') === 'development') {
    // Enable Chrome Logger only in dev
    ChromePhp::log($debugData);
}
3. Review web server and application configurations to ensure no debug headers are sent in production responses.
4. Implement automated security testing to detect debug headers in staging and production environments.
5. Establish deployment procedures that explicitly verify debugging tools are disabled before production releases.

References

Related Vulnerabilities