Vulnerability in Google Chrome lets you record video & audio

A vulnerability reported in the on April 10, 2017 allows an attacker to record audio or video using Google Chrome without any logging indication being displayed.

Most modern web browsers support the Web Real-Time Communications (WebRTC) feature. One of the advantages of WebRTC is that it supports real-time communication without the use of plugins. It has options to create audio and video chat services, p2p data sharing, sharing and many more.Google Chrome

However, there is a disadvantage in WebRTC, as local IP addresses can leak out through web browsers that support WebRTC.

The reported vulnerability affects Google Chrome, but it may affect other browsers. To work, you should visit a site and allow it to use WebRTC. A website that wants to record audio or video hidden without knowing it should create a JavaScript window, without a header, like a pop up or popup window, for example.

Then it can record audio or video without giving Google Chrome any indication that it is happening at the moment. Chrome usually displays the sign-ups on the tab that uses the feature, but because the JavaScript window does not have a header, nothing appears to the end user.

For the above defect, a PoC was created on the Chromium Bugs website. All you need to do is click on two buttons and allow the web page to use WebRTC in your browser. PoC can record the sound for 20 seconds and lets you download the recording to your computer.

One member of the Chromium team confirmed the vulnerability, but did not consider it important.

“It's not really a security vulnerability – for example, WebRTC on a mobile device doesn't show any indication of the . Το bug λειτουργεί μόνο στην επιφάνεια εργασίας όταν διαθέτουμε Chrome και υπάρχει s space in the UI.”

Of course, the technician's explanation doesn't make much sense. Since Android doesn't show the indicator and Google Chrome on the desktop only shows it if there is enough space in the UI, isn't that a security vulnerability? At the very least, it is a matter of protecting our privacy since a potentially eavesdropping operation occurs without users knowing.

Google may fix this vulnerability in the future, but until then, the best form of protection is to disable WebRTC, which can be done easily if you do not need it.

The second thing you can do is prevent websites from using WebRTC.

https://bugs.chromium.org/p/chromium/issues/detail?id=709952

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).