Web Browser Extension User-Script XSS Vulnerabilities

Web Browser Extension User-Script XSS Vulnerabilities

2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress Web Browser Extension User-Script XSS Vulnerabilities Muath Obaidat, Senior IEEE Member Joseph Brown Abdullah Al Hayajneh Center for Cybercrime Studies Center for Cybercrime Studies Professional Security Studies City University of New York City University of New York New Jersey City University New York, NY 10019, USA New York, NY 10019, USA Jersey City, NJ 07305, USA [email protected] [email protected] [email protected] Abstract—Browser extensions have by and large become a the browser extension ecosystem by introducing code- normal and accepted omnipresent feature within modern signing/certification and simplifying the extension pipeline, as browsers. However, since their inception, browser extensions have well as taking precautions such as sandboxing and remained under scrutiny for opening vulnerabilities for users. implementing wider permission management standards and While a large amount of effort has been dedicated to patching such models. These steps have played a role in mitigating issues issues as they arise, including the implementation of extension sandboxes and explicit permissions, issues remain within the stemming from either API vulnerabilities, or moderating and browser extension ecosystem through user-scripts. User-scripts, or preventing the sale of malicious extensions on browser micro-script extensions hosted by a top-level extension, are largely extension marketplaces. However, security vulnerabilities for unregulated but inherit the permissions of the top-level application browser extensions have by no means been eliminated; risks manager, which popularly includes extensions such as have continued to manifest as extensions continue to introduce Greasemonkey, Tampermonkey, or xStyle. While most user-scripts new functionalities to browsers. are docile and serve a specific beneficial functionality, due to their Many studies have been conducted in the field for inherently open nature and the unregulated ecosystem, they are analyzing commonalities and general exploits used by easy for malicious parties to exploit. Common attacks through this malicious extensions. However, while user-generated content method involve hijacking of DOM elements to execute malicious javascript and/or XSS attacks, although other more advanced extensions such as Greasemonkey may not be absent from this attacks can be deployed as well. User-scripts have not received research, research on user-script vulnerabilities specifically has much attention, and this vulnerability has persisted despite not been prominent. Browser extensions like Greasemonkey attempts to make browser extensions more secure. This ongoing and xStyle, among others, are unique for their reliance on user- vulnerability remains an unknown threat to many users who generated sub-scripts to extend their functionality. These employ user-scripts, and circumvents security mechanisms extensions act as a middleware for facilitating user-defined otherwise put in place by browsers. This paper discusses this actions. In doing so, the sub-extensions are not as regulated as extension derivative vulnerability as it pertains to current browser their top-level counterparts, and a variety of unique security security paradigms. risks are created. Keywords— browser, extension, plugin, vulnerability, exploit This study aims to discuss the context in which these sub-ecosystem browser extensions exist, as well as demonstrate I. INTRODUCTION how and why they are vulnerable to cyber-attacks, along with Browsers are essential tools which are used on an example of such. virtually all computers. Browser extensions, also sometimes The rest of this paper is organized as follows: Section called plugins or add-ons, are adaptable code packages meant II provides a review of related work in the field and necessary to be installed on a browser in order to extend their foundational background, Section III discusses the vulnerabilities found in functionality in one way or another, often modifying either a this discussed category of browser extension, Section IV browser behavior or a site-specific behavior. They have demonstrates an example of how this vulnerability in action, remained a popular feature in all major browsers, especially and finally Section V concludes the paper. Chrome and Firefox, for their user customization and ease of II. RELATED WORK & BACKGROUND access abilities. However, browser extensions have remained a consistent crux for security scrutiny, and have caused Security vulnerabilities stemming from browser controversy in the past for being vulnerable to an array of extensions are a long-studied topic within the cyber-security exploits, generally facilitated through XSS. Developers of field. Because of the differing structure of browser extensions browsers have continually taken steps to mitigate such between browsers, namely Firefox and Chrome, and due to vulnerabilities in recent years, including centralizing much of unique extension functionality, individual exploits are not 978-1-7281-6609-4/20/$31.00 ©2020 IEEE 322 DOI 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00062 always uniform [4][18][19]. Just as browsers themselves have abuses [19]. Most commonly, browser extension attacks happen faced a wide array of threats as their functionality continually in the form of cookie abuse, third-party tracking, CSRF attacks extends to include new elements (such as HTML5), or phase [5][9][18], remote code execution, cross-origin requests, data old out elements such as Flash Player, browser extensions have theft or spying [5][18][19], clickjacking [8] and fraud [19], and faced their own array of unique threats [17]. Many mitigations most commonly, XSS attacks [13][19]. XSS attacks are some to browser exploits mirror those of parallel fixes to wider of the most common attacks browsers face, and often receive vulnerabilities in overall browser functionality, the most scrutiny with security patches; the attacks outlined [13][14][17][20]. The most common browser attacks which within this study are derivative of XSS vulnerabilities. Some also relate to browser extensions include cross-site scripting research has shown that vulnerabilities are not always static, but (XSS) attacks, phishing, session hijacking, man-in-the-middle are dynamically created as users add more extensions to the and replay attacks, and clickjacking [17]. Extension browser pipeline; extensions loaded further down the line in this vulnerabilities often mirror these attacks, but more dangerous, pipeline are more vulnerable than initially loaded ones [14]. As as they have direct access to client-side API calls, loaded browsers continually extend their feature set, and extensions are versions of webpages, and access controls [17]. created which extend such functionalities, unforeseen side Before we can understand the direct ways in which effects often result in vulnerabilities because of functionality extensions are abused, it is first important to understand how cross-pollution [9]. The implementation of, and thus freedom extensions work within their respective browser ecosystems. given by, user-scripts can be seen as an example of this. Although browser extensions are not uniformly implemented DOM Manipulation and related derivative XSS attacks between browsers, most extensions are implemented in similar continue to be one of the most prominent issues with browser ways structurally amongst popular browsers [3][6][12][14]. extensions [12][14][17][18][20]. In most of these cases, such as Extensions are small, adaptable packages of code - typically the result of abusing both functionalities inherent to Javascript, Javascript and HTML/CSS alongside a manifest/packaging file as well as either access control, natively available browser - distributed for the purpose of changing or adapting browser APIs, or adjacent vulnerabilities such as information leakage or website functionality or aesthetic [6][15]. Extensions are [1][6][12][13][14][20]. In many cases, cross-site requests make primarily deployed on desktop browsers, but are sometimes usage of the XMLHttpRequest javascript function used in mobile browsers as well, which face even higher [1][6][16][20], although this is not the only function to be security risks [4][15]. Extensions can be separated into abused. Inadequate sandboxing can lead to vulnerabilities [6], categories based on functionality; (I) content scripts, or scripts as well as others which circumvent same-origin policies [20], which directly interact with loaded versions of web pages, (II) or exploit either access controls or side-channel extension cores (or background pages), which run more latently communications between content and browser or browser APIs to modify browser behavior, or (III) native extensions, which [3][16][17]. Studies which focus on or mention DOM and interact with the OS on the browser’s behalf. Types I and II are Javascript-derivative exploits have mentioned Greasemonkey the most common. [3][14][17]. Some extensions are more by name before, but only in relation to general extension API dormant, and run only when needed, while others are persistent research rather than specific functional exploits or in the background, and run constantly [14]. vulnerabilities. [6][13]. Despite the vulnerabilities prominent among browser Actively malicious extensions can be

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us