How this Chrome, Edge, and Opera security bug left users for a whole year

A cybersecurity researcher has revealed how a single vulnerability in Chromium-based Internet browsers has left Google Chrome, Microsoft Edge and Opera users exposed and exposed to knowledge theft for a year.

Affecting Android, Mac and Windows users, a chrome-powered zero-day Internet browser vulnerability that can be used between March 2019 and July 2020. Since Chromium feeds more than 65% of the use of all Internet browsers according to market percentage statistics for the final year July 2020, this means that billions of other people have been potentially affected.

The nature of the vulnerability in such a way that many of the world’s largest Internet sites would likely be exploited through this risk of circumventing the Content Security Policy (CSP). This included, according to researchers, ESPN, Facebook, Gmail, Instagram, Roblox, TikTok, WhatsApp and Zoom.

In an in-depth technical analysis, PerimeterX researcher Gal Weizman explains how he discovered the vulnerability of Chromium-based browsers that affected Chrome, Edge, and Opera Chrome 73 in March 2019 until the release of Chrome 84 in July 2020. Cross-platform, Android, Mac and Android users were all threatened, the vulnerability can allow a threatening actor to absolutely circumvent CSP regulations.

CVE-2020-6519 had the ability to have an effect on the maximum number of websites, as the vast majority reportedly do not use server-side controlled advanced CSP policies.

Among those who were unaffected, according to the researchers, were GitHub, Google Play Store, LinkedIn, PayPal, Twitter and Yahoo. These sites have implemented “CSP nuncio or hash”, the report says, to load this server-side coverage that is important here.

A content security policy, as the call suggests, is a method, method number one, to understand the security policies that allow the owner of an online page to prevent you from running what is called malicious mirror code.

CSP’s ability instructs the browser to enforce customer-related regulations, such as blocking or authorizing urgent inquiries; requests that come with certain types of JavaScript code execution. It is a smart thing for visitors to the online page to the danger of malicious scripts running on the consumer aspect in the browser.

“It’s incredibly dangerous for a vulnerability in the security mechanism that prevents such breaches,” Weizman said, “because the sites involved actively relied on CSP to supply the point of protection.”

Okay, it’s vital to say here, now, that the fact that there’s a vulnerskill, even on a 0 day like that, doesn’t mean that all internet sites on the planet, with the exception of a few, have been breached. . This would be a silly assumption, especially since any threatening actor deserves the ability to call a malicious script. This only explains why it has been classified as a vulnerable medium-risk skill than a critical skill.

So, can you breathe easily? Probably. Especially since the flaw has now been constant and while using the latest browser, Chrome 84, can no longer be exploited. Whether it’s Chrome, Edge, or Opera itself, you can check whether it’s set to the “About” option in the Help menu that will release an update if it’s not already in the latest version.

Website owners also check not only how well explained their CSP policies are, but also think about adding additional layers to the safety onion: detection and tracking of JavaScript-based ghost code to save you real-time code injection is advised through PerimeterX.

Julia Szyndzielorz, Opera’s director of public relations, said: “The challenge you discussed has been solved. As long as everyone helps keep their Opera browser up to date, they shouldn’t be subject to this vulnerability.”

I contacted Google and Microsoft to comment on this story.

I have been a generation journalist for 3 decades and have been editor-in-chief of PC Pro mag since the first factor in 1994. Three-time BT winner

I have been an experienced journalist for 3 decades and have been editor-in-chief of PC Pro mag since the first factor in 1994. A three-time winner of the BT Security Journalist of the Year Award (2006, 2008, 2010) he was also fortunate to be named BT’s Tech Journalist of the Year in 1996 for an innovative feature in PC Pro called “Internet Threats”. In 2011, I won the Enigma Award for my lifelong contribution to computer security journalism. Contact me with confidence [email protected] if you have a story to reveal or a search to share.

Leave a Comment

Your email address will not be published. Required fields are marked *