27 of a 100 tested Google Chrome extensions have been found vulnerable to data (passwords, history, etc.) extraction attacks though specially crafted malicious websites or by attackers on public WiFi networks.
A trio of security researchers have manually analyzed 50 of the most popular Chrome extensions and added to that list 50 more chosen by random.
The bad news is that over 25 percent of the tested extensions were found to be vulnerable, and among them are seven that are used by over 300,000 users.
But, there’s also good news: 49 of the 51 vulnerabilities found can be patched by simply adapting the extensions to use one of two offered Content Security Policies (CSP).
“In addition to core extension bugs, extensions can add vulnerabilities to web sites,” points out Porter Felt. “CSP will not prevent this, but developers should remember not to use innerHTML to modify web sites. Instead, use innerText or DOM methods like appendChild. Extensions also shouldn’t add HTTP scripts or CSS to HTTPS web sites.”