Chrome extensions can steal plaintext passwords from websites

ZeroStrawberries

Level 2
Thread author
Mar 7, 2020
84
A team of researchers from the University of Wisconsin-Madison has uploaded to the Chrome Web Store a proof-of-concept extension that can steal plaintext passwords from a website's source code.

An examination of the text input fields in web browsers revealed that the coarse-grained permission model underpinning Chrome extensions violates the principles of least privilege and complete mediation.

Additionally, the researchers found that numerous websites with millions of visitors, including some Google and Cloudflare portals, store passwords in plaintext within the HTML source code of their web pages, allowing extensions to retrieve them.
It turns out that a decent amount of websites store passwords and other crucial information in plain-text in HTML when inputting information into their websites.
The researchers found that many popular websites have critical issues and lack protection.
Notable website examples of lack of protections highlighted in the report include:
  • gmail.com – plaintext passwords on HTML source code
  • cloudflare.com – plaintext passwords on HTML source code
  • facebook.com – user inputs can be extracted via the DOM API
  • citibank.com – user inputs can be extracted via the DOM API
  • irs.gov – SSNs are visible in plaintext form on the web page source code
  • capitalone.com – SSNs are visible in plaintext form on the web page source code
  • usenix.org – SSNs are visible in plaintext form on the web page source code
  • amazon.com – credit card details (including security code) and ZIP code are visible in plaintext form on the page's source code

A Google spokesperson has confirmed that they're looking into the matter, and pointed to Chrome's Extensions Security FAQ that does not consider access to password fields a security problem as long as the relevant permissions are properly obtained.
In addition to that discovery, the researchers also noticed that the Chrome web store allowed potential harmful extensions to be published, with Google mentioning that as long as the relevant permissions are properly obtained, it does not believe that access to password fields should be an issue.
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
Finally, the analysis showed that 190 extensions (some with over 100k downloads) directly access password fields and store values in a variable, suggesting that some publishers may already be trying to exploit the security gap.
It's actively being exploited.


Root causes for attack success

Improper Application of Security Principles.

The success of our attack can be largely attributed to the improper application of fundamental security principles within the current design of web browsers and extensions. One of the key issues lies in the coarse-grained permission model at the HTML level. Once an extension is allowed to run on a page, it has unrestricted access to all elements. This unrestricted access is in direct violation of the Principle of Least Privilege, a fundamental security principle that advocates for limiting the permissions granted to a process to only those that are necessary for its function. This unrestricted access also undermines the principle of Complete Mediation, which requires that every access to a resource be checked for appropriate permissions. In the current model, once an extension has been granted access to a page, subsequent accesses to elements on the page are not checked, allowing the extension to interact with all elements on the page freely. These violations of fundamental security principles create an environment where sensitive data is vulnerable to unauthorized access and manipulation, highlighting the need for a more secure design that adheres to these principle

Trade-off Between Usability and Security.

In security systems, there is often a trade-off between usability and security. This trade-off is clearly evident in the current security landscape of web browsers and extensions. Websites often rely on browsers to provide the necessary security protections, placing trust in the browser’s ability to safeguard sensitive data. However, this trust can lead to vulnerabilities if the browser’s protections are insufficient or can be circumvented by malicious extensions. An example of this trade-off can be seen in password managers. While they aim to improve convenience by storing and automatically filling passwords, they require access to password fields, which can compromise security measures. This creates a challenge in balancing between implementing strict security measures and ensuring the smooth operation of password managers. Interestingly, we observed that many websites attempt to obfuscate Social Security Numbers (SSNs) but not passwords. This suggests a recognition of the need for protection of sensitive data, but an inconsistent application of it. The decision to obfuscate SSNs but not passwords may be driven by a desire to balance usability and security, but it also highlights the complexities and potential pitfalls of this trade-off.

Websites’ Bad Practices.

Our case studies revealed a range of security practices across different websites, with some leaving sensitive input fields unprotected or implementing only minimal protections. The reasons for these practices are not always clear, but they contribute to the overall vulnerability of these input fields. Even obfuscation, while better than leaving sensitive data in plain sight, is insufficient to fully secure these fields.

Flaws in Online Review Process of Extensions.

Lastly, the online review process for extensions, particularly those with dynamically loaded selectors, has significant flaws. These flaws can allow malicious extensions to pass through the review process undetected, providing them with a platform to launch attacks. It’s important to note that this is different from code injection, as the malicious code is part of the extension itself, not injected into the webpage. These factors combine to create a landscape where sensitive input fields are vulnerable to attack. In Section 5 and Section 6, we measure the practicality and prevalence of this vulnerability on real websites by conducting large-scale measurements (Section 5) and case studies (Section 6).

PDF: https://arxiv.org/pdf/2308.16321.pdf
 
F

ForgottenSeer 103564

Would this apply to all web browser's not just Chrome ? :unsure:
Yes it would apply to all browsers running extensions. The extensions themselves give warning of access, and the user grants this access upon installation. It states "plain text" passwords not encrypted, which is just common sense "obvious" as they can see everything you are doing once granted access. One could consider this title in the article click bait.
 

golongtime

New Member
Sep 12, 2023
0
I'm so sick of these thieves you can't even enjoy the internet because of the low lives !! That company drained my credit card i just had gotten. They know where it's coming from India and China just cut them off!!
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top