Security researchers discovered flaws (PDF) in the extension systems of all modern browsers (Browsers) that can be exploited by attackers to list all installed extensions of theletterof browsing.
Attack affects all modern browsers. Researchers have managed to confirm it on all Chromium-based browsers and believe it affects other browsers like Firefox or Edge using the same extensions system. The add-on system for Firefox is also vulnerable to attack.
Chromium-based browsers that are affected are Google Chrome, Yandex and Opera, and Firefox - based browsers, such as Firefox or Pale Moon and the Microsoft Edge.
All browsers protect the data of the extensions from the websites they visit. However, we've seen that sites use different techniques to collect data from browsers.
Security researchers have discovered a way to help them list installed browser extensions even in the latest versions of browsers.
The “timing attack” or “timing side-channel attack” can be used to enumerate installed browser extensions by monitoring the browser's response to accessing system resources.
When a website requests access to a resource extensions in the browser, the browser must perform two checks: one to see if the extension exists, and another to see if the resource the site wants to access is publicly available.
By monitoring the response, attackers may detect the reason behind a request being denied. The site measures the time it takes to return a request from a fake extension and the time it takes a real extension.
By comparing time, installed extensions are revealed. According to the researchers, the accuracy of the method reaches 100%.
Attack uses extensions ID and some code. Researchers already have approximately 10000 Chrome and Firefox extensions identifiers. This allows them to accurately locate extensions by comparing the identifiers.
"Real" attackers could use this information for fingerprinting or targeted attacks against specific browser extensions.
Since all these attacks are based on scripts, any scripts blocking can protect you from the attack.
Update: After a conversation we had on Facebook with a friend of SecNews, we were thinking of clarifying that the Apple browser is also affected: influenced by leakage URI in the Safari extensions model.