7 mobile browsers vulnerable to address bar spoofing attacks

Address bar spoofing vulnerabilities have been around since the early days of the web, but they have never been so dangerous as they are today.

While on desktop there are various signs and security features that could be used to detect when malicious code alters the address bar to display a bogus URL, this is not possible on browsers where screen size is at a premium, and many of the security features found in desktop browsers are missing.

With the address bar being the only and last line of defense on mobile browsers, address bar spoofing vulnerabilities are many times more dangerous on smartphones and other mobile devices.

10 Address bar Spoofing Bugs in 7 Mobile Browsers

In a report published today by cyber-security firm Rapid7, the company said it worked with Pakistani security researcher Rafay Baloch to disclose ten new address bar spoofing vulnerabilities across seven mobile browser apps.

Impacted include big names like Apple SafariOpera Touch, and Opera Mini, but also niche apps like BoltRITSUC Browser, and Yandex Browser.

The issues were discovered earlier this year and reported to browser makers in August. The big vendors patched the issues right away, while the smaller vendors didn’t even bother replying to the researchers, leaving their browsers vulnerable to .

The Rapid7 exec says that by messing with the timing between when the page loads and when the browser gets a chance to refresh the address bar URL, a malicious site could force the browser to show the wrong address.

A finer breakdown of the technical “shenanigans” of each bug is available here, as detailed by Baloch.

Exploiting any of these bugs requires (1) an outdated browser and (2) an attacker capable of luring users on malicious sites.

Beardsley believes that attacks are easy to mount and recommends that users update their browsers as soon as possible or move to browsers that are not affected by these bugs.

You might also like

Comments are closed.