Continuing with this article series. This time I’m discussing the potential impact of various extension privileges if these fall into the wrong hands. That’s the last preparation article, next time it’s going to be about actual vulnerabilities.
What does it take to make an extension page vulnerable Remote Code Execution, giving away access to all extension privileges? Quite a lot actually. This article looks into what a vulnerable extension looks like and how it could be attacked.
Next article, continuing to look at potential attacks on extension pages. This time looking at web-accessible pages, this allows for lots of potential mischief. So the article covers lots of ground. Hopefully still comprehensible this way.
A Mastodon instance for info/cyber security-minded people.