Xorte logo

News Markets Groups

USA | Europe | Asia | World| Stocks | Commodities



Add a new RSS channel

 
 


Keywords

2024-09-21 15:30:53| Engadget

One of the feature that separates the Arc browser from its competitors is the ability to customize websites. The feature called "Boosts" allows users to change a website's background color, switch to a font they like or one that makes it easier for them to read and even remove an unwanted elements from the page completely. Their alterations aren't supposed to be be visible to anyone else, but they can share them across devices. Now, Arc's creator, the Browser Company, has admitted that a security researcher found a serious flaw that would've allowed attackers to use Boosts to compromise their targets' systems.  The company used Firebase, which the security researcher known as "xyzeva" described as a "database-as-a-backend service" in their post about the vulnerability, to support several Arc features. For Boosts, in particular, it's used to share and sync customizations across devices. In xyzeva's post, they showed how the browser relies on a creator's identification (creatorID) to load Boosts on a device. They also shared how someone could change that element to their target's identification tag and assign that target Boosts that they had created.  If a bad actor makes a Boost with a malicious payload, for instance, they can just change their creatorID to the creatorID of their intended target. When the intended victim then visits the website on Arc, they could unknowingly download the hacker's malware. And as the researcher explained, it's pretty easy to get user IDs for the browser. A user who refer someone to Arc will share their ID to the recipient, and if they also created an account from a referral, the person who sent it will also get their ID. Users can also share their Boosts with others, and Arc has a page with public Boosts that contain the creatorIDs of the people who made them.  In its post, the Browser Company said xyzeva notified it about the security issue on August 25 and that it issued a fix a day later with the researcher's help. It also assured users that nobody got to exploit the vulnerability, no user was affected. The company has also implemented several security measures to prevent a similar situation, including moving off Firebase, disabling Javascript on synced Boosts by default, establishing a bug bounty program and hiring a new senior security engineer.This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/the-arc-browser-that-lets-you-customize-websites-had-a-serious-vulnerability-133053134.html?src=rss


Category: Marketing and Advertising

 

Latest from this category

28.11Florida buyers are first to close on a home using AI, saving thousands in realtor fees
27.11Decathlon asks folks to shoot them an invite this Black Friday  for sports, not shopping
26.11SMB Landing Page Optimization Trends
26.11How to Turn a Branded B2B Podcast Into a High-Impact Revenue Engine
26.11With its new course, MasterClass reframes cybersecurity as a must-have skill for consumers
25.11The Top Frustrations B2B Buyers Have With Vendors
25.11How US Professionals Are Building Their Personal Brands [Infographic]
25.11Brand vs. Branding: Aligning Your Brand and Branding Builds Perception and Trust
Marketing and Advertising »

All news

29.11Airlines work to fix software glitch on A320 aircraft and some flights are disrupted
29.11Budget 2025: What's the best and worst that could happen for Labour?
29.11Dalal Street Week Ahead: Nifty scales record high, but limited market support flags caution near 26,300
29.11Almost 20 years after he was first shorn, Andrew grad Tom Serratore is helping lead St. Baldricks charge
29.11Flights returning to normal after Airbus warning grounded planes
29.11FIIs net sellers of Rs 3,765 crore till November 29, but flows may shift as sentiment turns
29.11How SailGP turned the niche sport into a $200 million celebrity investment magnet
29.11Silver ready for next leg of rally? This technical pattern indicates upside potential of up to $9
More »
Privacy policy . Copyright . Contact form .