Yahoo! plugs leaky Axis extension

Powered by SC Magazine
 

Chrome plugin loses shine at launch.

Yahoo!'s Chrome search extension dubbed Axis was found on its debut launch to have exposed a private certificate capable of allowing attackers to craft authentic but malicious plugins.

The flaw was detected by Aussie security researcher and coder Nik Cubrilovic who detailed a proof of concept interception attack that used the signing key on his blog.

The certificate file is used by Yahoo! to sign the extension package, which is used by Chrome and the webstore to authenticate that the package comes from Yahoo!," Cubrilovic said.

"With access to the private certificate file, a malicious attacker is able to create a forged extension that Chrome will authenticate as being from Yahoo!

“The clearest implication is that with the private certificate file and a fake extension, you can create a spoofed package that captures all web traffic including passwords [and] session cookies."

He said the code could be delivered by running a DNS spoof of the update URL which would silently install and run the spoofed extension during an update.

Yahoo! disabled the Google Chrome extension and issued a fixed version.

Yahoo!'s Axis team blacklisted the exposed certificate key with Google which it said resolved the vulnerability.

“We take issues like this very seriously and are dedicated to working around the clock to ensure resolution. We apologise for any inconvenience.”

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Yahoo! plugs leaky Axis extension
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 337

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 140

Vote