Argentinean security researcher Manuel Caballero has discovered another vulnerability in Microsoft’s Edge browser that can be exploited to bypass a security protection feature and steal data such as passwords from other sites, or cookie files that contain sensitive information.
The vulnerability is a bypass of Edge’s Same Origin Policy (SOP), a security feature that prevents a website from loading resources and code from other domains except its own.
SOP bypass uses server redirects and data URIs
To exploit the flaw, Caballero says that an attacker can use server redirect requests combined with data URIs, which would allow him to confuse Edge’s SOP filter and load unauthorized resources on sensitive domains. The expert explains the attack step by step on his blog.
In the end, the attacker will be able to inject a password form on another domain, which the built-in Edge password manager will automatically fill in with the user’s credentials for that domain. Below is a video of the attack.
Additionally, an attacker can steal cookies in a similar manner. More demos are available on a page Caballero set up here.
Two weeks ago, Caballero found another SOP bypass in Edge, which an attacker could also exploit to steal cookies and passwords. That particular exploit relied on a combination of data URIs, meta refresh tag, and domainless pages, such as about:blank.
Compared to the previous SOP bypass, the technique Caballero disclosed yesterday has the advantage that it’s faster to execute compared to the first, which required the attacker to log users out of their accounts and re-authenticate them in order to collect their credentials.
Edge plagued by three unpatched SOP bypasses right now
What’s more worrisome is that Microsoft has not patched any of the SOP bypass issues the expert discovered.
“We have 3 SOP bypasses right now,” Caballero told Bleeping Computer today when asked to confirm the status of the three bugs.
This month’s Patch Tuesday, released two days ago, patched the Edge SmartScreen issue Caballero discovered last December, but the researcher found a way to bypass Microsoft’s patch within minutes.
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.