• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / News / Browsers: Data leakage across platforms

Browsers: Data leakage across platforms

29/08/2017 10:47 by giorgos

Security researchers discovered flaws (PDF) to the extensions systems of all modern browsers that can exploit intruders to list all installed browser extensions.

Attack affects all modern browsers. Researchers have managed to confirm it on all Chromium-based browsers and believe it affects other browsers like Firefox or Edge using the same extensions system. The add-on system for Firefox is also vulnerable to attack.browsers - Browsers: Data leakage across all platforms

Chromium-based browsers that are affected are Google Chrome, Yandex and Opera, and Firefox - based browsers, such as Firefox or Pale Moon and the Microsoft Edge.

All browsers protect the data of the extensions from the websites they visit. However, we've seen that sites use different techniques to collect data from browsers.

Security researchers have discovered a way to help them list installed browser extensions even in the latest versions of browsers.

The "timing side-channel attack" can be used to list installed browser extensions by monitoring the browser's response to access to system resources.

When a site requests access to an extension resource in the browser, the browser must perform two checks: one to see if the extension exists and another to see if the resource that the site wants to access is publicly available .

Watching the answer, the attackers may find the reason behind the refusal of a request. The site counts the time it takes to return a request from a false extension and the time it takes for a real extension.

By comparing time, installed extensions are revealed. According to the researchers, the accuracy of the method reaches 100%.

Attack uses extensions ID and some code. Researchers already have approximately 10000 Chrome and Firefox extensions identifiers. This allows them to accurately locate extensions by comparing the identifiers.

"Real" attackers could use this information for fingerprinting or targeted attacks against specific browser extensions.

Since all these attacks are based on scripts, any scripts blocking can protect you from the attack.

Update: After a conversation we had on Facebook with a friend of SecNews, we were thinking of clarifying that the Apple browser is also affected: influenced by leakage URI in the Safari extensions model.

Browsers: Data leakage across platforms was last modified: 29 August, 2017, 11: 22 am by giorgos

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: NewsDay: 100%, Chrome Firefox, I'm sure, scripts

You May Also Like

Do you have anything to post? Send it to Your Post
iGuRu about hosting and site changes
iGuRu.gr the 50 shades of gray

About Us giorgos

George still wonders what he's doing here ...

Previous Post: « Chrome: Quickly delete browsing data
Next Post: CentOS 7.4 1708 The next big version is coming »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.