Cybersecurity researchers have disclosed a safety flaw within the Opera internet browser for Microsoft Home windows and Apple macOS that could possibly be exploited to execute any file on the underlying working system.
The distant code execution vulnerability has been codenamed MyFlaw by the Guardio Labs analysis workforce owing to the truth that it takes benefit of a function referred to as My Stream that makes it attainable to sync messages and recordsdata between cell and desktop gadgets.
“That is achieved by means of a managed browser extension, successfully bypassing the browser’s sandbox and the whole browser course of,” the corporate stated in an announcement shared with The Hacker Information.
The difficulty impacts each the Opera browser and Opera GX. Following accountable disclosure on November 17, 2023, it was addressed as a part of updates shipped on November 22, 2023.
My Stream incorporates a chat-like interface to trade notes and recordsdata, the latter of which could be opened through an online interface, that means a file could be executed outdoors of the browser’s safety boundaries.
It’s pre-installed within the browser and facilitated by way of a built-in (or inside) browser extension referred to as “Opera Contact Background,” which is liable for speaking with its cell counterpart.
This additionally signifies that the extension comes with its personal manifest file specifying all of the required permissions and its conduct, together with a property often known as externally_connectable that declares which different internet pages and extensions can hook up with it.
Within the case of Opera, the domains that may speak to the extension ought to match the patterns “*.movement.opera.com” and “.movement.op-test.internet” – each managed by the browser vendor itself.
“This exposes the messaging API to any web page that matches the URL patterns you specify,” Google notes in its documentation. “The URL sample should comprise not less than a second-level area.”
Guardio Labs stated it was in a position to unearth a “long-forgotten” model of the My Stream touchdown web page hosted on the area “internet.movement.opera.com” utilizing the urlscan.io web site scanner device.
“The web page itself seems to be fairly the identical as the present one in manufacturing, however modifications lie beneath the hood: Not solely that it lacks the [content security policy] meta tag, but it surely additionally holds a script tag calling for a JavaScript file with none integrity examine,” the corporate stated.
“That is precisely what an attacker wants – an unsafe, forgotten, weak to code injection asset, and most significantly, has entry to (very) excessive permission native browser API.”
The assault chain then hinges, making a specifically crafted extension that masquerades as a cell system to pair with the sufferer’s pc and transmit an encrypted malicious payload through the modified JavaScript file to the host for subsequent execution by prompting the person to click on wherever on the display.
The findings spotlight the rising complexity of browser-based assaults and the completely different vectors that may be exploited by risk actors to their benefit.
“Regardless of working in sandboxed environments, extensions could be highly effective instruments for hackers, enabling them to steal info and breach browser safety boundaries,” the corporate informed The Hacker Information.
“This underscores the necessity for inside design modifications at Opera and enhancements in Chromium’s infrastructure. As an example, disabling third-party extension permissions on devoted manufacturing domains, just like Chrome’s internet retailer, is beneficial however has not but been applied by Opera.”
When reached for remark, Opera stated it moved rapidly to shut the safety gap and implement a repair on the server aspect and that it is taking steps to forestall such points from taking place once more.
“Our present construction makes use of an HTML normal, and is the most secure choice that doesn’t break key performance,” the corporate stated. “After Guardio alerted us to this vulnerability, we eliminated the reason for these points and we’re ensuring that related issues is not going to seem sooner or later.”
“We wish to thank Guardio Labs for his or her work on uncovering and instantly alerting us to this vulnerability. This collaboration demonstrates how we work along with safety specialists and researchers around the globe to enhance our personal efforts at sustaining and enhancing the safety of our merchandise and guaranteeing our customers have a secure on-line expertise.”



