HomeVulnerabilityDOM-Based mostly Extension Clickjacking Exposes Well-liked Password Managers to Credential and Data...

DOM-Based mostly Extension Clickjacking Exposes Well-liked Password Managers to Credential and Data Theft

Well-liked password supervisor plugins for internet browsers have been discovered vulnerable to clickjacking security vulnerabilities that may very well be exploited to steal account credentials, two-factor authentication (2FA) codes, and bank card particulars below sure situations.

The method has been dubbed Doc Object Mannequin (DOM)-based extension clickjacking by unbiased security researcher Marek Tóth, who offered the findings on the DEF CON 33 security convention earlier this month.

“A single click on anyplace on an attacker-controlled web site may enable attackers to steal customers’ knowledge (bank card particulars, private knowledge, login credentials, together with TOTP),” Tóth stated. “The brand new method is normal and could be utilized to different forms of extensions.”

Cybersecurity

Clickjacking, additionally referred to as UI redressing, refers to a kind of assault wherein customers are tricked into performing a collection of actions on an internet site that seem ostensibly innocent, akin to clicking on buttons, when, in actuality, they’re inadvertently finishing up the attacker’s bidding.

See also  Hackers are promoting stolen AMD knowledge on the darkish net in change for crypto

The brand new method detailed by Tóth basically entails utilizing a malicious script to govern UI components in an internet web page that browser extensions inject into the DOM — for instance, auto-fill prompts, by making them invisible by setting their opacity to zero.

The analysis particularly targeted on 11 fashionable password supervisor browser add-ons, starting from 1Password to iCloud Passwords, all of which have been discovered to be vulnerable to DOM-based extension clickjacking. Collectively, these extensions have tens of millions of customers.

To tug off the assault, all a foul actor has to do is create a pretend web site with an intrusive pop-up, akin to a login display screen or a cookie consent banner, whereas embedding an invisible login kind such that clicking on the positioning to shut the pop-up causes the credential data to be auto-filled by the password supervisor and exfiltrated to a distant server.

“All password managers stuffed credentials not solely to the ‘principal’ area, but in addition to all subdomains,” Tóth defined. “An attacker may simply discover XSS or different vulnerabilities and steal the consumer’s saved credentials with a single click on (10 out of 11), together with TOTP (9 out of 11). In some eventualities, passkey authentication is also exploited (8 out of 11).”

Following accountable disclosure, six of the distributors have but to launch fixes for the defect –

  • 1Password Password Supervisor 8.11.4.27
  • Apple iCloud Passwords 3.1.25
  • Bitwarden Password Supervisor 2025.7.0
  • Enpass 6.11.6
  • LastPass 4.146.3
  • LogMeOnce 7.12.4
Identity Security Risk Assessment

Software program provide chain security agency Socket, which independently reviewed the analysis, stated Bitwarden, Enpass, and iCloud Passwords are actively engaged on fixes, whereas 1Password and LastPass marked them as informative. It has additionally reached out to US-CERT to assign CVE identifiers for the recognized points.

See also  CISA Warns of Lively Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel

Till fixes can be found, it is suggested that customers disable the auto-fill operate of their password managers and solely use copy/paste.

“For Chromium-based browser customers, it is suggested to configure web site entry to ‘on click on’ in extension settings,” Tóth stated. “This configuration permits customers to manually management auto-fill performance.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular