Главная
Study mode:
on
1
Intro
2
Browser Extensions
3
Permission Model In Extensions
4
Host Access Permissions
5
Sample Extension
6
Load Local Files & Privileged Pages
7
JavaScript Protocol
8
Host Permission Bypass
9
Stealing Google Emails
10
Stealing Local Files
11
Changing internal dev settings
12
Enabling/Disabling Adobe F Player
13
Edge Reading Mode
14
Other Extensions Internal Pages
15
CSP Privileges Escalation
Description:
Explore the critical security vulnerabilities in Microsoft Edge browser extensions in this 30-minute conference talk from the 36C3 event. Dive into the intricacies of browser extension permissions, focusing on host access permissions and their potential for exploitation. Learn how researchers discovered methods to bypass these permissions, allowing malicious extensions to access sensitive data across various websites and even local system files. Understand the implications of this security flaw, which led to the assignment of CVE-2019-0678. Follow the speaker's journey through extension implementation, manipulation of Tabs API, exploitation of JavaScript protocol, and escalation of Content Security Policy privileges. Gain insights into how these vulnerabilities could lead to unauthorized access to emails, local files, and internal browser settings. Discover the potential risks associated with browser extensions and the importance of robust security measures in protecting user privacy and data. Read more

Breaking Microsoft Edge Extensions Security Policies

media.ccc.de
Add to list
0:00 / 0:00