Abstract : This presentation focuses on a 0-day vulnerability in Mozilla Firefox, which is a browser side-channel attack leveraging the URL protocol handler. The attack exploits subtle behavioral differences in how the browser handles URL protocol requests, using them as an oracle to identify applications installed in the target's machine. Several CVE numbers have been assigned to this vulnerability, and we will delve into how I discovered and attacked the bug, addressing the privacy and security risks posed by the URL protocol handler leaks. This talk is aimed at security researchers and developers interested in attacks against modern web browsers. *Note: This vulnerability was patched as of November 16, 2024.
URL:https://www.avtokyo.org/avtokyo2024/speakers