Vulnerability in Screencastify for Chrome Allows Spying on Users through Cameras

Vulnerability in Screencastify for Chrome
Written by Emma Davis

The popular Screencastify Chrome extension for capturing and sharing videos from websites contains a cross-site scripting (XSS) vulnerability that could allow arbitrary websites to force users to unintentionally turn on their cameras.

Using this vulnerability, attackers can download received videos from victims’ Google Drive.

Let me remind you that we also wrote that Because of vulnerabilities in Android, malware can control the user’s camera, and that Chrome will stop using all the RAM on PCs and smartphones.

The problem was discovered by the developer Vladimir Palant, who reported his discovery to the manufacturer in February 2022. While the vulnerability was fixed the next day, Palant said the extension still poses a threat because the code trusts multiple partner subdomains, and an XSS vulnerability on any of them could potentially be used to attack Screencastify users.

The extension gives screencastify.com enough privileges to record video through the user’s webcam and get the result. No user interaction is required, and there are almost no visible indicators of what is happening. You can even hide your tracks – just delete the video from Google Drive and use another message to close the tab with the extension after the recording is completed.Vladimir Palant explained.

Notably, the extension provides these privileges not only to Screencastify via app.screencastify.com, but also to a number of other domains, including Webflow, Teachable, Atlassian, Netlify, Marketo, ZenDesk, and Pendo via Screencastify subdomains.

According to Palant, neither the domains nor subdomains of Screencastify delegated to partners have an adequate content security policy.

Vulnerability in Screencastify for Chrome

The developer discovered the problem on February 14, 2022, and on February 15 it was fixed. According to the message he received from the manufacturer, a long-term plan on content security policies also had to be implemented, but as of May 23, the policies have not been changed for either app.screencastify.com or www.screencastify.com, with the exception of adding framing protection.

The API studied by Palant was not restricted and still issues Google OAuth tokens, which can be used to access victims’ Google Drive.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Emma Davis

I'm writer and content manager (a short time ago completed a bachelor degree in Marketing from the Gustavus Adolphus College). For now, I have a deep drive to study cyber security.

Leave a Reply

Sending