Visible to the public Web Browser Extension User-Script XSS Vulnerabilities

TitleWeb Browser Extension User-Script XSS Vulnerabilities
Publication TypeConference Paper
Year of Publication2020
AuthorsObaidat, M., Brown, J., Hayajneh, A. A.
Conference Name2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
KeywordsAutonomic Security, Big Data, browser, browser security, Browsers, compositionality, Ecosystems, exploit, extension, Human Behavior, Metrics, plugin, pubcrawl, resilience, Resiliency, security, Vulnerability, Web Browser Security
Abstract

Browser extensions have by and large become a normal and accepted omnipresent feature within modern browsers. However, since their inception, browser extensions have remained under scrutiny for opening vulnerabilities for users. While a large amount of effort has been dedicated to patching such issues as they arise, including the implementation of extension sandboxes and explicit permissions, issues remain within the browser extension ecosystem through user-scripts. User-scripts, or micro-script extensions hosted by a top-level extension, are largely unregulated but inherit the permissions of the top-level application manager, which popularly includes extensions such as Greasemonkey, Tampermonkey, or xStyle. While most user-scripts are docile and serve a specific beneficial functionality, due to their inherently open nature and the unregulated ecosystem, they are easy for malicious parties to exploit. Common attacks through this method involve hijacking of DOM elements to execute malicious javascript and/or XSS attacks, although other more advanced attacks can be deployed as well. User-scripts have not received much attention, and this vulnerability has persisted despite attempts to make browser extensions more secure. This ongoing vulnerability remains an unknown threat to many users who employ user-scripts, and circumvents security mechanisms otherwise put in place by browsers. This paper discusses this extension derivative vulnerability as it pertains to current browser security paradigms.

DOI10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00062
Citation Keyobaidat_web_2020