Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Internet Explorer Vulnerable To Browser History Hijacking

Researchers found that 1% of the world's most popular websites can force Microsoft's IE to reveal every past website visited unless private browsing controls are enabled.

How Firesheep Can Hijack Web Sessions
(click image for larger view)
Slideshow: How Firesheep Can Hijack Web Sessions

Is your browser history safe? According to security researchers, attackers -- or just curious websites -- can "sniff" every website previously visited by your browser.

That's the warning from researchers at the University of California at San Diego, who studied the use of JavaScript on the world's 50,000 most popular websites and found that "popular Web 2.0 applications like mashups, aggregators and sophisticated ad targeting are rife with different kinds of privacy-violating flows."

For example, researchers found that 485 of those 50,000 websites use code that can deduce a browser's history, 63 transfer the history to their network and 46 completely hijack the browser's history. These sites include Youporn, an adult website that's one of the world's 100 most popular websites, reports Alexa , which ranks websites based on traffic.

Whether used for attack or advertising-related purposes, history sniffing works by forcing a user to visit a website, where a hidden part of the page links to another website. Since browsers display links to visited sites differently, websites practicing history sniffing can use JavaScript to tell if the user has visited the referenced websites in question before.

Beyond history sniffing, the researchers also studied and found multiple examples of related techniques: cookie stealing (using a cookie to "see" other cookies), location hijacking (using cookie sniffing to force the user to visit a website) and behavior tracking (recording how a user moves the mouse over the screen).

These uses of JavaScript aren't just theory. According to the researchers, "Tealium and Beencounter sell services that allow a website to collect the browsing history of their visitors using history sniffing." Likewise, numerous websites -- including Microsoft, Wired, Yahoo Japan and YouTube -- use behavior tracking techniques, which allow websites to "construct a high-fidelity timeline of how a particular user interfaced with a web page," including clicks, mouse movements and records of copied text.

When it comes to history hijacking, current versions of most browsers -- including Firefox, Chrome and Safari -- are immune, but Internet Explorer is not. To block such attacks, IE users must enable "private browsing."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17660
PUBLISHED: 2019-10-16
A cross-site scripting (XSS) vulnerability in admin/translate/translateheader_view.php in LimeSurvey 3.19.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the tolang parameter, as demonstrated by the index.php/admin/translate/sa/index/surveyid/336819/lang/ PATH_INFO.
CVE-2019-11281
PUBLISHED: 2019-10-16
Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input...
CVE-2019-16521
PUBLISHED: 2019-10-16
The broken-link-checker plugin through 1.11.8 for WordPress (aka Broken Link Checker) is susceptible to Reflected XSS due to improper encoding and insertion of an HTTP GET parameter into HTML. The filter function on the page listing all detected broken links can be exploited by providing an XSS payl...
CVE-2019-16522
PUBLISHED: 2019-10-16
The eu-cookie-law plugin through 3.0.6 for WordPress (aka EU Cookie Law (GDPR)) is susceptible to Stored XSS due to improper encoding of several configuration options in the admin area and the displayed cookie consent message. This affects Font Color, Background Color, and the Disable Cookie text. A...
CVE-2019-16523
PUBLISHED: 2019-10-16
The events-manager plugin through 5.9.5 for WordPress (aka Events Manager) is susceptible to Stored XSS due to improper encoding and insertion of data provided to the attribute map_style of shortcodes (locations_map and events_map) provided by the plugin.