Security experts discovered a vulnerability in the popular Evernote Web Clipper for Chrome can be exploited to steal sensitive data from sites visited by users.
“In May 2019 Guardio’s research team has discovered a critical vulnerability in Evernote Web Clipper for Chrome.” reads a blog post published by Guardio. “A logical coding error
The vulnerability, tracked as CVE-2019-12592, could be exploited by attackers operating malicious websites to bypass the browser’s same-origin policy (SOP) and execute arbitrary code on the victim’s behalf.
The Evernote Web Clipper extension for Chrome allows users to easily save online content to Evernote, including web pages, articles, images, text, and emails. The popular extension has over 4.6 million users.
The attack scenario sees hackers tricking victims into visiting specially crafted
The vulnerability discovered by the experts in the Evernote extension allows an attacker to inject a malicious payload into all iframe contexts and steal credentials, cookies, and other data.
The researchers also provided a description of a Proof-of-Concept (PoC) attacks to steal sensitive data from an unsuspecting user, below the attack scenario:
- User navigates to the attacker’s malicious website (e.g. via social media, email, a compromised blog comment, etc.).
- Malicious website silently loads hidden, legitimate iframe tags (link) of targeted websites.
- The exploit is triggered by the malicious website and causes Evernote’s internal infrastructure to inject an attacker controlled payload into all iframes contexts.
- Injected payload is customized for each targeted website, able to steal cookies, credentials, private information, perform actions as the user and more.
Below the timeline of the flaw:
- May 27th, 2019 – Initial disclosure.
- May 28th, 2019 – Follow-up email.
- May 28th, 2019 – Issue confirmed and classified as a vulnerability.
- May 29th, 2019 – Credited on Evernote’s Security Page (link).
- May 31st, 2019 – Evernote Web Clipper 7.11.1 released.
- June 4th, 2019 – Fix confirmed.