Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    Wednesday, February 11
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
    NotesleuNotesleu
    Home»Vulnerabilities»Chrome extensions can steal plaintext passwords from websites
    Vulnerabilities

    Chrome extensions can steal plaintext passwords from websites

    By securnerd3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Follow Us
    Google News

    University of Wisconsin-Madison’s researchers have brought to light a potential vulnerability through a Chrome extension prototype, demonstrating its ability to harvest plaintext passwords from website source codes.

    Deep dive into web browser text inputs revealed a concerning gap in Chrome’s permission model, showing it goes against the best practice of adopting minimal privilege and comprehensive mediation. Even more alarmingly, popular portals like Google and Cloudflare, among many others, were found to embed passwords in plain text within their HTML source codes. This creates an avenue for Chrome extensions to easily access these passwords.

    Where the Issue Lies

    Extensions are given free rein over the website’s DOM (Document Object Model) tree when they load, providing the opportunity to access potentially confidential user input fields. Because there isn’t a security buffer between website elements and the extension, extensions can freely access any data in the source code.

    Furthermore, these extensions can exploit the DOM API, enabling them to immediately extract values as users input them. This circumvents any security measures a website may have in place to obscure these inputs.

    Despite the recent introduction of Google Chrome’s Manifest V3 protocol, which aims to curb API misuse and tighten extension security, there’s no concrete security boundary between extensions and web pages. Thus, the underlying issue persists.

    Putting the Web Store to the Test

    To examine the robustness of Google’s Web Store screening procedures, the research team built and submitted a seemingly benign Chrome extension with capabilities to execute password theft. The extension, which portrayed itself as an AI-based assistant, could:

    1. Record the HTML source code during a user’s login attempt.
    2. Exploit CSS selectors to select and retrieve user inputs.
    3. Swap JS-obfuscated fields with exposed password fields.

    This covert approach ensured the extension met Manifest V3’s guidelines, thereby bypassing Google Chrome’s Web Store scrutiny. The research team upheld ethical considerations by avoiding actual data collection and swiftly removed the extension post-approval.

    Extent of Exposure

    The researchers found startling numbers from the top 10,000 websites listed by Tranco, identifying around 1,100 sites that openly store passwords within the HTML DOM. An additional 7,300 were identified as susceptible to DOM API exploitation.

    Their detailed study also disclosed that a staggering 12.5% of Chrome Web Store extensions (about 17,300) possess the permissions necessary to pull sensitive website information. Among these are popular extensions like ad blockers and shopping tools with millions of users.

    Some high-traffic websites that showed vulnerabilities included:

    • gmail.com and cloudflare.com: Displayed plaintext passwords.
    • facebook.com and citibank.com: Allowed user inputs to be accessed via the DOM API.
    • irs.gov, capitalone.com, and usenix.org: Showed Social Security Numbers in plaintext.
    • amazon.com: Revealed credit card information in plaintext.

    Moreover, 190 extensions, some with hundreds of thousands of users, directly engage with password fields, indicating a possible exploitation of this security loophole by some developers.

    In response to these findings, Amazon emphasized their commitment to user security, urging browser and extension developers to prioritize security. Google confirmed they are investigating the findings and referred to Chrome’s Extensions Security FAQ, which currently does not treat access to password fields as a security breach, given that permissions are correctly acquired.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 69

    Related Posts

    • Disclaimer
    • What are Transformers in Artificial Intelligence?
    • Reptile Rootkit: The Linux Menace Unleashed on South Korean Computer Systems
    • North Korea’s Lazarus Group Utilizes Cross-Chain Cryptocurrency Laundering Techniques to Illicitly Gain $900 Million
    Follow on Google News
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Microsoft Enhances Windows 11 Security with Kerberos Authentication Over NTLM Protocol

    October 15, 202318 Views

    Malicious Ads Exploit macOS Users, Unleashing Stealer Malware

    April 1, 202418 Views

    Independent Lab Validates Nubeva’s Innovative Ransomware Key Interception and Decryption Technology

    July 26, 202316 Views
    • Contact Us
    • About US
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.