Guardio Labs has identified and disclosed a serious Opera browser vulnerability, allowing malicious extensions to exploit Private APIs and perform actions such as screen capturing, browser setting changes, and account hijacking. This vulnerability can be exploited across different extension stores, as demonstrated via a malicious extension that bypassed security measures and was accepted into Google's Chrome Store. The case emphasizes the need for stringent review processes and continuous post-approval monitoring to safeguard against such threats.
Table of contents
“CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store AttackIntro — Browser Sandboxing ConceptionCustomizing Browsers via Private APIsBreaking the Private API Bearier — With ExtensionsThe Art of Extension-Based Code InjectionExploiting Private APIs with a POC ExtensionIf One Store is Closed, Somewhere Another is Open“Privately-Stashing” A Cute Puppy ExtensionThe Final Result — End-to-EndLessons LearnedSort: