EmPoWeb: Empowering Web Applications with Browser Extensions

01/10/2019
by   Doliere Francis Some, et al.
0

Browser extensions are third party programs, tightly integrated to browsers, where they execute with elevated privileges in order to provide users with additional functionalities. Unlike web applications, extensions are not subject to the Same Origin Policy (SOP) and therefore can read and write user data on any web application. They also have access to sensitive user information including browsing history, bookmarks, cookies and list of installed extensions. Extensions have a permanent storage in which they can store data and can trigger the download of arbitrary files on the user's device. For security reasons, browser extensions and web applications are executed in separate contexts. Nonetheless, in all major browsers, extensions and web applications can interact by exchanging messages. Through these communication channels, a web application can exploit extension privileged capabilities and thereby access and exfiltrate sensitive user information. In this work, we analyzed the communication interfaces exposed to web applications by Chrome, Firefox and Opera browser extensions. As a result, we identified many extensions that web applications can exploit to access privileged capabilities. Through extensions' APIS, web applications can bypass SOP, access user cookies, browsing history, bookmarks, list of installed extensions, extensions storage, and download arbitrary files on the user's device. Our results demonstrate that the communications between browser extensions and web applications pose serious security and privacy threats to browsers, web applications and more importantly to users. We discuss countermeasures and proposals, and believe that our study and in particular the tool we used to detect and exploit these threats, can be used as part of extensions review process by browser vendors to help them identify and fix the aforementioned problems in extensions.

READ FULL TEXT

page 1

page 4

research
08/06/2019

After You, Please: Browser Extensions Order Attacks and Countermeasures

Browser extensions are small applications executed in the browser contex...
research
08/30/2023

Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields

In this work, we perform a comprehensive analysis of the security of tex...
research
05/19/2023

Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API

The Chromium open-source project has become a fundamental piece of the W...
research
08/06/2023

A Security and Usability Analysis of Local Attacks Against FIDO2

The FIDO2 protocol aims to strengthen or replace password authentication...
research
11/02/2018

Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance

Extensions provide useful additional functionality for web browsers, but...
research
01/10/2019

Collaborative Privacy for Web Applications

Real-time, online-editing web apps provide free and convenient services ...
research
04/04/2022

JShelter: Give Me My Browser Back

The Web is used daily by billions. Even so, users are not protected from...

Please sign up or login with your details

Forgot password? Click here to reset