Multiple Address Bar Spoofing Vulnerabilities In Mobile Browsers
Background
Google on their Google Vulnerability Reward Program (VRP) rules classifies address bar as the only reliable security indicator in order to validate the authenticity of the website. To quote them, “We recognize that the address bar is the only reliable security indicator in modern browsers”. Since the inception of Covid-19, a remarkable increase in spear phishing attacks has been recorded.As per a report by Zscaler in April 2020, a significant increase of about 85% increase in phishing attacks were recorded in April, aimed at targeting remote workers in which attackers had registered domains featuring Covid-19 related keywords such as “wuhan”, “vaccine” etc. in order to steal credentials, disseminate malware, most notably ransomware for conducting financial frauds. More recently, Microsoft in its Microsoft Digital Defense Report, has highlighted about the increasing sophistication of cyber threats and has categorized email phishing as the most dominant attack vector for enterprises.
With ever growing sophistication of spear phishing attacks, exploitation of browser-based vulnerabilities such as address bar spoofing may exacerbate the success of spear phishing attacks and hence prove to be very lethal. First and foremost, it is easy to persuade the victim into stealing credentials or distributing malware when the address bar points to a trusted website and giving no indicators forgery, secondly since the vulnerability exploits a specific feature in a browser, it can evade several anti-phishing schemes and solutions.
In the past, I have uncovered several address bar spoofing vulnerabilities in Desktop & Mobile browsers, writeups of which can be found here, here and here. Apart from which, I presented a paper at Blackhat “Bypassing Browser Security Policies for Fun and Profit “ which discussed various types of spoofing related issues.
More recently, as a part of my thesis while perusing MSC in Cyber Security, I had written a framework for testing various categories of browser vulnerabilities such as UXSS, file cross attacks, CSP bypasses and spoofing attacks. The results uncovered several security address bar spoofing vulnerabilities in mobile browsers.
Technical Details
Address Bar Spoofing – Vulnerability 1
Proof of Concept
|
Figure 1: Address Bar spoofing in MAC OS HIGH SIERRA 10.13.6 (17G14019) |
Address Bar Spoofing – Vulnerability 2
Proof of Concept
|
Figure 3: Address Bar spoofing vulnerability in Yandex
browser for android |
|
Figure 4: Address Bar spoofing vulnerability in opera touch
for iOS |
Address Bar Spoofing – Vulnerability 3
Proof of Concept
|
Figure 5: Address Bar spoofing vulnerability in UC browser
for android |
|
Figure 6: Address Bar spoofing vulnerability in Opera
Touch for iOS |
Address Bar Spoofing – Vulnerability 4
Proof of Concept
|
Figure 7: Address Bar spoofing vulnerability in Opera touch
Browser |
Address Bar Spoofing – Vulnerability 5
Proof of Concept
|
Figure 8: Address Bar spoofing vulnerability in UC Browser
Android |
|
Figure 9: Address Bar spoofing vulnerability in Opera Mini Android |
|
Figure 10: Address Bar spoofing vulnerability in RITS Browser |
|
Figure 11: Address bar spoofing vulnerability in Bolt BROWSER IOS |