Phantomboxe Posted August 28, 2017 Share Posted August 28, 2017 Security researchers have discovered two flaws that affect the extension systems embedded in today's browsers, such as Firefox, Safari, and all the Chromium-related offshoots, such as Chrome, Opera, and others. These flaws can be exploited by a determined attacker to expose a list of the user's installed extensions with a 100% accuracy. This information can be used to fingerprint users based on their installed extensions, to unmask anonymous users hiding behind VPN or Tor traffic, or to create advertising profiles. First flaw effects widely used WebExtensions API Two researchers from the University of Deusto in Spain and a researcher from Eurecom, a French research center, have discovered these flaws. The first flaw affects the extension system used with Chromium-based browsers such as Google Chrome, Opera, the Yandex Browser, and Comodo Dragon. The same extension system — the WebExtensions API — is also used by newer versions of Firefox, Edge, Vivaldi, and Brave. Researchers didn't test these browsers, but they said they believe them to be affected as well. The WebExtensions API protects browsers against attackers trying to list installed extensions by using access control settings in the form of the manifest.json file included in every extension. This file blocks websites from checking any of the extension's internal files and resources unless the manifest.json file is specifically configured to allow it. Timing side-channel attack on WebExtensions add-onns Researchers found that browser using the Chromium WebExtensions API take a little bit longer to reply to a request from a website for files stored locally for a bogus extension compared to a valid extension but with the wrong path. chrome-extension://[fakeExtID]/[fakePath] chrome-extension://[realExtID]/[fakePath] This allowed researchers to deduce which extensions are installed in the user's browser by bombarding the target with a series of dual requests and recording the time it takes a browser to respond. This worked for Chrome, Opera, Yandex Browser, and Comodo Dragon. Old Firefox add-on system also affected by the same law Firefox is also vulnerable. The browser is currently transitioning from the old XML-based Add-ons API to the Chromium-friendly WebExtensions API. Researchers didn't test the newer implementation since it was still under development, but they said the old Add-ons API is also vulnerable to the same attack. Furthermore, because Firefox raises special errors for when requesting files from fake extensions, the attack is even more accurate on Firefox. Safari affected by URL leakage The second flaw they discovered is called URI leakage and affects Safari's extensions model. These extensions don't use manifest.json file to restrict access to extension files. Instead, they generate a random URL per browser session that only users can access while using the browser. Researchers discovered methods to leak the data necessary to guess these random URLs. Tests showed they were able to leak the extension's URL in 40.5% of tested extensions. Flaw not fixed "We responsibly disclosed all our findings and we are now discussing with the developers of several browsers and extensions to propose the correct countermeasures to mitigate these attacks in both current and future versions," the research team says. In their research paper — titled "Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies" — researchers also detailed methods of using these two flaws for advertising analytics purposes, but also for malicious applications such as targeted malware, social engineering, or vulnerable extension exploitation. source Link to comment Share on other sites More sharing options...
steven36 Posted August 28, 2017 Share Posted August 28, 2017 They knew about uri leak in Firefox for along time there is add-on too help mitigate this in older versions of Firefox like Firefox ESR Quote This extension hides private and important metadata of your browser, usually obtainable using resource:// URIs, against the Web. You should have it installed if you use many extensions, because having many extensions means having many tracking and fingerprinting vectors. Also, Web sites can generally probe Firefox for installed extensions in many cases without this. The extension makes that privacy threat less effective. It may break some extensions which depend on this leak. https://addons.mozilla.org/en-US/firefox/addon/no-resource-uri-leak/ The thing is some of the new web extensions want work at all if you use this addon . PS also the addon is working for me using my old Firefox profile with Waterfox 54 Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.