Closed
Bug 1696258
Opened 5 years ago
Closed 5 years ago
WebExtension: remote user tracking
Categories
(WebExtensions :: Untriaged, defect)
WebExtensions
Untriaged
Tracking
(Not tracked)
RESOLVED
INVALID
People
(Reporter: michael.rouges, Unassigned)
Details
(Keywords: reporter-external, Whiteboard: [reporter-external] [client-bounty-form] [verif?])
Attachments
(1 file)
|
2.37 KB,
application/x-xpinstall
|
Details |
Firefox version: 86.0
OS version: Windows 10
remote-user-tracking
This exploit demonstrates how to send some tailored scripts to inject on any web
page and to exchange critical data between tabs.
Permissions
<all_urls>, used to trigger on each pagewebNavigation, used to trigger on page loading
Vectors
chrome.executeScript()blob:/data:scripts- Any network accessor, from the background (uses
EventTargetbut can work withfetch,xhr, ...)
Steps to reproduce
- Add the extension to the browser
- Open any number of new tabs
- Open the devtools console
- Visit any page with a strict CORS configuration, on each tab
- Check the console warnings
Behavior
- It creates an
EventTargetcallinghttps://lcfvs-cve-server.glitch.me/subscribe - It saves the cookie and gets that cookie value as first message
- On any page loading, it calls
https://lcfvs-cve-server.glitch.me/location - It warns a message, with an object containing
- the current
tabId - the current
history - the current
uuid
- the current
Server
Flags: sec-bounty?
Comment 1•5 years ago
|
||
I don't quite understand the claim, or at least what is novel about it that requires a security bug filing. Of course a malicious web extension can track you (and worse). Such an extension would violate the addon policies you agree to when you submit them.
Component: Security → Untriaged
Product: Firefox → WebExtensions
Updated•5 years ago
|
Type: task → defect
Comment 2•5 years ago
|
||
Not a security bug. An extension with the right permissions can get access to data/interaction on said domains. This is a feature and not a bug.
Status: UNCONFIRMED → RESOLVED
Closed: 5 years ago
Resolution: --- → INVALID
Updated•5 years ago
|
Flags: sec-bounty? → sec-bounty-
Updated•4 years ago
|
Group: firefox-core-security
Updated•1 year ago
|
Keywords: reporter-external
You need to log in
before you can comment on or make changes to this bug.
Description
•