Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Chrome Security IT Technology

Chrome To Block Tab-Nabbing Attacks (zdnet.com) 27

Google will deploy a new security feature in Chrome next year to prevent tab-nabbing, a type of web attack that allows newly opened tabs to hijack the original tab from where they were opened. From a report: The new feature is scheduled to go live with Chrome 88, to be released in January 2021. While the term "tab-nabbing" refers to a broad class of tab hijacking attacks [see OWASP, Wikipedia], Google is addressing a particular scenario. This scenario refers to situations when users click on a link, and the link opens in a new tab (via the "target=_blank" attribute). These new tabs have access to the original page that opened the new link. Via the JavaScript "window.opener" function, the newly opened tabs can modify the original page and redirect users to malicious sites. This type of attack has powered quite a few phishing campaigns across the years. To mitigate this threat, browser makers like Apple, Google, and Mozilla have created the rel="noopener" attribute.
This discussion has been archived. No new comments can be posted.

Chrome To Block Tab-Nabbing Attacks

Comments Filter:
  • by ArsenneLupin ( 766289 ) on Wednesday November 11, 2020 @12:19PM (#60711648)
    Why did they not simply make rel=noopener the default?
  • by Todd Knarr ( 15451 ) on Wednesday November 11, 2020 @12:21PM (#60711652) Homepage

    Why isn't the default to not give access to the opener, and require the opener to declare that it wants to give the new tab access if it needs to? Requiring an extra declaration to close the hole means the hole isn't being closed until all web sites update their pages. And frankly I can't see any good reason for the new tab to have access to it's opener at all. Plenty of bad reasons, yes, but no good ones.

    • by _xeno_ ( 155264 ) on Wednesday November 11, 2020 @12:44PM (#60711722) Homepage Journal

      For the same reason ActiveX stuck around for so long: backwards compatibility.

      Hell, the company I work for still has an internal website that breaks if you have a popup blocker. In 2020.

      You know, that thing that every browser does and has done for at least the past decade? Yeah, that completely breaks the site.

      Given that there are pages that break with popup blockers in 2020, it's fairly safe to assume that there are a mess of internal websites that will never be updated to support any other changes.

      It's part of the problem with deciding to just declare HTML 5 a "living standard:" you can't just make changes and have new pages opt into them, all changes affect everything, so there's no way to tell a page that was written for 2010 HTML 5 compared to 2020 HTML 5.

      (The worst thing is that I'm pretty sure the internal website is provided by a third party partner, who made sure to update and remove all instances of Flash, but who still demands you disable any popup blockers. In 2020. And, no, I have not bothered figuring out why saying "allow this popup" that most browsers allow doesn't work, but it doesn't. You have to let it open a popup immediately or it doesn't work. In 2020.)

      • Re: (Score:3, Insightful)

        by LenKagetsu ( 6196102 )

        Remember when Apple said "We're no longer doing flash" and to the protests they said "Tough shit"? More firms need to do that, as today's security is more important than yesterday's compatibility. If your page breaks, then that's too bad. Maybe you shouldn't have been such a snowflake when designing your site.

      • I always had a simple response when an internal web site broke like that and they requested changes to settings to keep it working: "I'm sorry, the current settings are the ones supplied by IT as standard and I can't just go randomly changing them. If you need changes to them, contact IT and have them arrange to include your requirements in the corporate configuration policies.". That usually stymies them, since IT's default response to requests like that is "Please justify the business need for your change

      • I was very upset when I heard they took version numbers out of the standard. That's like removing the concept of timestamps.

  • How about fixing the Facebook issue. If you do a search and it directs you to Facebook, the back arrow is disabled. It is such a pain in the ass.

    Just my 2 cents worth.
  • Why the hell would they even allow this?

    We can't trust the developers of Javashit to not put in "features" that is guaranteed to screw over the user, evidence of which I have seen all too often.

    Dare I say that Javashit itself should be classified as malware?

    • by Gavagai80 ( 1275204 ) on Wednesday November 11, 2020 @12:53PM (#60711760) Homepage

      It should be allowed if the opener is on the same domain -- it's easy to imagine uses for that. But I can't see a reason to allow the opened page to modify a different domain.

      • This should be the fix. Make this "noopener" thing the new default but make exceptions for the same domain. This way it should not break "legit" uses and should stop phishing attacks.

      • Its still not easy to imagine good uses for it, even on the same domain.

        Why is the second document modifying the first document?

        "Because they are really programs"

        OK then why is the second program modifying the first program?

        *crickets*

        ...

        "Its OK because the two programs are stored on the same hard drive"

        This shit was never a good thing, under any of the surrounding rhetoric you might try.
      • Even then it's a bad idea. Lots of websites still mix user uploaded data (images, files, etc) and interactive interfaces on the same domain. If you need 2 pages of your website to talk to each other (whether one opened the other or not), use the f*cking server as a proxy like a sane person.
  • That's exactly why I currently have the following browser setup:
    1. Private browsing - Tor
    2. Trusted browsing - Hardened Firefox - browsing trusted sites only, i.e. bank, bills, known and trusted pages. The only browser with external password manager.
    3. Casual browsing - Hardened Firefox inside Firejail. Complete separation from the operating system, other processes and file system.
    4. Chrome - Unrestricted but with annoyances off. Development only.

    Thanks to this set up I can worry less about what I com
  • Can they provide something to prevent awkward content pausing (used by some sites for ads or mandatory courses) when focus is switched away from the browser window? Usually sites base this on 'focus' and 'blur' events.

  • There are legitimate uses of linking parent and child windows. For example, you can go to a third party shopping site, click the PayPal link, and have the payment interaction happen entirely in a separate window. However that does not mean there are negative consequences, like this one.

    What I see is that: web developers discover a new trick, it gets traction, over time browser developers embrace it into a standard, and then we realize how shortsighted it was in the first place, and scramble to close the sec

Elliptic paraboloids for sale.

Working...