Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Yahoo Axis Chrome Extension Leaked Private Key Information

Yahoo has since released an updated extension to address the issue, which was discovered by a security researcher shortly after Yahoo announced Axis.

When Yahoo released its new Axis extension for Google’s Chrome browser Wednesday, the company accidentally disclosed a private signing key that could be abused by an attacker.

Yahoo has since released an updated extension to address the issue, which was discovered by a security researcher shortly after Yahoo announced Axis.

When Yahoo released its new Axis extension for Google’s Chrome browser Wednesday, the company accidentally disclosed a private signing key that could be abused by an attacker.

The mistake was discovered by security researcher Nik Cubrilovic shortly after Yahoo launched Axis, which is available both as a mobile browser and a desktop plug-in for the Chrome, Firefox, Safari and Internet Explorer browsers. According to Cubrilovic, the private signing key Yahoo included in the source file could be used to create a malicious, signed browser extension that would be treated as legitimate.

“The certificate file is used by Yahoo! to sign the extension package, which is used by Chrome and the webstore to authenticate that the package comes from Yahoo!,” he blogged. “With access to the private certificate file a malicious attacker is able to create a forged extension that Chrome will authenticate as being from Yahoo!.”

As a proof-of-concept, Cubrilovic cloned the source file to the extension and added a content script that prompts a JavaScript alert, then signed the forged extension with the Yahoo certificate and installed it in Chrome.

“A private key is used by a developer to sign an extension package in order to prove that the extension is actually from the developer,” blogged security specialist Joshua Long. “If a malicious third party were to obtain the private key, they would be able to release an extension signed with that developer’s certificate. In other words, any of us could write an app and fairly convincingly pretend that it was actually from Yahoo.”

Axis Leaks Private Key

With the private certificate file and a fake extension an attacker could create for example a spoofed package that captures all web traffic, including passwords and session cookies, Cubrilovic blogged.

“The easiest way to get this installed onto a victims machine would be to DNS spoof the update URL,” he explained. “The next time the extension attempts to update it will silently install and run the spoofed extension.”

Advertisement. Scroll to continue reading.

A Yahoo spokesperson told SecurityWeek that it worked quickly to resolve the issue and has released a new Chrome plug-in. “Yahoo! takes online security seriously… Users who downloaded Yahoo! Axis on Chrome between the hours of 6-9 p.m. Pacific Time on May 23, 2012, are encouraged to uninstall the previous version and reinstall the new version at axis.yahoo.com,” the spokesperson said.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.