Opera has fixed a worrying security vulnerability, which could have allowed threat actors to access permissive APIs in the browser, and thus take over accounts, tweak browser settings, and even take screenshots.
Cybersecurity researchers GuardioLabs disclosed their findings, and dubbed the vulnerability “CrossBarking”.
The flaw revolves around the fact that multiple Opera-owned, publicly accessible subdomains, have privileged access to private APIs embedded within the browser. These domains support different features of the browser, such as the Pinboard, Opera Wallet, and others. By abusing browser extensions, crooks could inject malicious JavaScript into these domains, and thus gain access to the APIs.
Malicious extensions
"The content script does have access to the DOM (Document Object Model)," the researchers explained in a blog post. "This includes the ability to dynamically change it, specifically by adding new elements."
Access to the APIs then allow crooks to screenshot open tabs, pull session cookies to access different accounts, and modify the browser’s DNS-over-HTTPS settings to resolve domains through malicious DNS servers. This, the researchers further explain, could lead to victims opening fake bank sites and losing banking credentials.
To demonstrate that the vulnerability works, GuardioLabs published a small browser extension to the Google Chrome Web Store. From there, an Opera browser user picks it up and compromises their device. The silver lining here is that the extension requires permission to run JavaScript on any web page, and particularly those that have access to private APIs.
Luckily, Opera has already addressed the issue and fixed the flaw in version 113.0.5230.132, so make sure to update your browser to avoid any unnecessary risk.
Being omnipresent, browsers are an extremely popular target for cybercriminals. The most popular products, such as Chrome, Firefox, Sarafi, Opera, or Edge, are generally considered safe, but addons are a different story, since many are developed by third parties and don’t necessarily have the same approach to cybersecurity as the browser makers themselves.
Edit, November 1 -
Commenting on GuardioLabs' findings, an Opera spokesperson clarified that the attack is not easy to pull off and stressed the importance of manually reviewing add-ons in the store.
"The avenue of attack is not straightforward at all and would not be able to affect a large number of users," the representative told us. "That's because it relies on the user installing and giving permission to a malicious extension - which is not even available in Opera's add-on store. So the user has to go to Chrome's web store to find and install the extension."
The spokesperson basically threw Google a curveball, saying an extra layer of protection here is that all add-ons in the Opera store are manually reviewed before being offered for download.
"Such an extension would never have made it past manual review in Opera's add-on store. Today, we are the only add-on store operator applying manual review to all extensions, specifically to stop such malicious extensions from coming through," they concluded.
Via The Hacker News
More from TechRadar Pro
- Major new malware campaign hits thousands of WordPress sites
- Here's a list of the best firewalls today
- These are the best endpoint protection tools right now