Hackers kunnen Adblock Plus filters gebruiken voor de opslag van malware code

In popular advertisement blocker Adblock Plus is found vulnerability that allows organization of JavaScript-code performance.

JS-code can be executed in case of usage unchecked filter, adopted by intruders (Bijvoorbeeld, while connection to list side rules or through the substitution of rules in MITM-attack).

Authors of lists with filter sets can organize performance of their code in context of web-sites that user opens through adding lines with “rewrite” operator that makes substitution of URL-part. Rewrite operator does not enable substituting of a host in URL though allows freely manipulate with inquiry arguments. Substitution by tags as script, object and subdocument is blocked but text can be used for replacement.

niettemin, code performance can be achieve another way. Some websites, inclusief Google Maps, Gmail En Google Images, apply technique of dynamic JavaScript-blocks download that is transited in a form of naked text. Except hosts that enables redirecting, attack can also be accomplished against services that allows users’ content accommodation.

Suggested method involves only pages that dynamically download lines with JavaScript code and then perform them. Another important limitation is necessity of redirect using or placement of random data on a page of initial server that gives resource.

Fixing of an issue is on a preparatory stage. Adblock and uBlock also encounter this problem.

Adblock Plus developers assess possibility of real attacks as Google heeft onlangs de release aangekondigd van een nieuwe versie van de Chrome-browser as they censor all changes in service rules list and seldom practice connection of side lists.

Bron: www.adblockplus.org/blog

Polina Lisovskaja

Ik werk al jaren als marketingmanager en zoek graag naar interessante onderwerpen voor jou

Laat een antwoord achter

Terug naar boven knop