Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Safari bug can leak your browsing history and Google account information
#1
Exclamation 
Quote:
[Image: Safari-bug-can-leak-your-browsing-histor...ation.webp]

A week ago, we discussed Powerdir, a vulnerability in macOS that could have been used by hackers to access the user's data. The issue, which was discovered by Microsoft engineers, was fixed by Apple in a patch that shipped last year. Today, news about a Safari bug has surfaced, that can leak your browsing history and information related to your Google account.Safari bug can leak your browsing historyApple's browser, which is the default on macOS, iOS, and iPadOS has a security issue related to IndexedDB. This  is an API that is used by websites to store data on the device, and uses the same-origin policy. It restricts other websites, documents, scripts from accessing data belonging to a specific website. It is kind of like a sandbox for the data created by a website.

IndexedDB, or Indexed databases, are tied to a specific origin, e.g. your Google account is associated with its own database. So, theoretically, other sites should not be able to access the information stored in the database, but FingerprintJS has discovered that an exploit exists in Safari 15, that can reveal the data to other sites.

How is that possible? When a website accesses a database, the rest of the data from other tabs, windows and frames in the current session are stored in a new database. The problem here is that the newly created database shares the same name as the original one, as a result of which the database names are leaked across different origins (websites).

This in turn will allow websites to identify users by their unique ID. What's worse here is that the websites store the authenticated Google user ID in these databases. In the event someone has logged into multiple accounts, each one has its own database. The user ID is used by Google to identify the user via the People API, to fetch the publicly available personal information from the account, such as their profile picture. So, a malicious website can get this information, just because a tab or window that is active in the background can access the IndexedDB API. When you visit other websites, that data is also stored in the database, meaning your browsing history is also exposed to third-parties.

Here's an official video from the fingerprinting benchmark service, that illustrates how the vulnerability works. The website has a proof-of-concept demo page, that you can open from your macOS, iOS or iPadOS device, to test if your browser is affected by the IndexedDB bug. The demo site detects many including Alibaba, Google, Dropbox, Twitter, VK, WhatsApp, Xbox, to name a few, but many other websites could be targeted by the exploit.

I tried accessing the page on my old iPad, and Safari 14 does not seem to be impacted by the bug. But when my friend visited the demo site on his iPhone with Safari 15, the page said that his browser is vulnerable to the exploit, and revealed his unique Google ID number as proof of it.

The article first spotted by 9to5Mac, says that Apple is yet to patch this Safari bug, even though FingerprintJS had reported it to the Cupertino company on November 28th.
...
Continue Reading
[-] The following 1 user says Thank You to harlan4096 for this post:
  • ismail
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Malwarebytes 5.1.3.110
Malwarebytes 5.1.3...Mohammad.Poorya — 00:51
Music Videos
Billy Joel - The Riv...jAcos — 17:24
Movies! Movies!
Beverly Hills Cop: A...jAcos — 17:22
TV Series
Matlock Kathy Bat...jAcos — 17:16
F-Secure 19.4
What's new in the ...harlan4096 — 09:44

[-]
Birthdays
Today's Birthdays
avatar (42)techlignub
avatar (41)Stevenmam
avatar (48)onlinbah
Upcoming Birthdays
avatar (43)wapedDow
avatar (49)steakelask
avatar (43)Termoplenka
avatar (41)bycoPaist
avatar (47)pieloKat
avatar (41)ilyagNeexy
avatar (49)donitascene
avatar (49)Toligo

[-]
Online Staff
There are no staff members currently online.

>