Vulnerabilities discovered in many web browsers that allow users to be tracked through installed applications
If successfully exploited, the vulnerability could allow a malicious actor to track a specific user across multiple browser platforms on the same device by querying the very apps the target has installed. placed on that device.
In fact, certain apps, when installed, create a custom URL scheme that the browser can use to launch URLs in those specific apps.
For example, the custom URL scheme for the popular online conferencing application Zoom is zoommtg:// which, when opened, prompts the browser to launch the Zoom client, as shown in the illustration below. .
There are over a hundred different custom URL handlers configured by the apps, including many well-known names like Slack, Skype, Spotify, Zoom, vscode, Epic Games, Telegram, Discord, Slack , Steam, Battle.net, Xcode, NordVPN, Sketch, Teamviewer, Microsoft Word, WhatsApp, Postman, Adobe, Messenger, Figma, Hotspot Shield, ExpressVPN, Notion or even iTunes.
Browser tracking using URL scheme
A team of security researchers from FingerprintJS recently found a vulnerability that allows websites to track users across many different browsers, including popular names like Chrome, Firefox, Microsoft Edge , Safari and even Tor.
To perform cross-browser tracking by taking advantage of the URL scheme, a website would have to build a profile of the apps installed on the target's device by attempting to open handlers Their known URL, and especially check if the browser launches the prompt.
If a prompt is given to open the application, it can be assumed that a particular application is already installed. By testing different URL handlers, a script can use detected apps to create a unique profile for your device.
Since the apps installed on the device don't change no matter what browser you're using, this could allow the script to track the user's browser usage on both Google Chrome and the hidden browser name like Tor.
To test this vulnerability, researchers at BleepingComputer tried accessing a demo website at Schemeflood.com with Microsoft Edge - where a script launches URL handlers for multiple applications to determine if they installed or not.
The results showed that a unique identifier was displayed on the user's profile. In particular, this identifier is completely null for tests using other browsers such as Firefox, Google Chrome and Tor. This is the code that websites can use to track users.
Notably, out of the four major browsers tested, only Google Chrome has added mitigations to prevent this type of attack. Specifically by preventing multiple attempts to use URL handlers without user action (interaction). However, researchers have also found that activating a built-in Chrome extension, such as PDF Viewer, bypasses this mitigation effort.
In related news, Microsoft Edge program manager Eric Lawrence acknowledged the existence of this attack, and said that Chromium and Microsoft engineers are actively working on fixing the bug.
You should read it
- The Mail app on iOS has serious vulnerabilities
- IBM developed a new technology to patch security holes
- Security vulnerabilities - basic insights
- HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
- Warning: The number of vulnerabilities in open source software are increasing rapidly
- Find security holes on every site with Nikto
- If you are using Firefox, update it immediately to fix security
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
May be interested
- Stop installing these applications and programs on Windows 10have you ever thought about applications that are already installed on your computer? we're not talking about applications like microsoft word or adobe photoshop, which have millions of users and are completely safe to use. here we refer to third-party applications, when performing useful tasks.
- Free applications should be installed when purchasing a new Macbookwhen buying a new macbook, apple installed by default for users some applications to use. however, those applications have not really met the users' extensive use needs. the applications in the article below can be referenced to install on the device.
- 13 popular applications have serious security vulnerabilities, users need to update immediatelyapple and the citizen lab have just discovered a serious security vulnerability, affecting a series of popular applications and millions of internet users.
- Microsoft blocked IE attacks with smart tacticslast tuesday, microsoft provided users with a 'sub-lining' application - shim - capable of blocking attacks aimed at ie when they exploited a bug discovered last month.
- New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloudan extremely serious new class of intel chip vulnerabilities has been discovered by security researchers at graz university of technology, if successful exploitation of the bad guys can take advantage of it to steal sensitive information online. next from the processor.
- 12 Android applications have security holes, users should update immediatelysecurity vulnerabilities have been discovered in android applications and system components on xiaomi phones, allowing criminals to access arbitrary activities and services with system privileges, steal files...
- Detecting an extremely dangerous vulnerability on nearly 16,000 iOS applicationsapps with high download volume and users of over 100 million people like instagram, amazon, twitter and dropbox are likely to be affected.
- 6 types of unreliable applications on Google Play, should not be installed on smartphonesbelow is a list and how to identify unreliable types of applications on google play that users should not install for their smartphones.
- iOS 12 allows users to completely delete preinstalled applications on iPhonewith ios 12 just released, apple has allowed users to completely remove some applications preinstalled on iphone or ipad.
- Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computerthe research team from qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on internet explorer.