🤖 AI Summary
This study identifies systematic privacy protection failures in mainstream web privacy tools (e.g., uBlock Origin, Privacy Badger) when handling local frames—particularly `about:blank` iframes—enabling fingerprinting, cookie theft, and data exfiltration attacks that evade detection.
Method: We conduct a multi-faceted empirical analysis including large-scale web security measurement, iframe origin semantics analysis, black-box functional testing, filter rule efficacy evaluation, and cross-tool vulnerability validation.
Contribution/Results: We are the first to systematically characterize the anomalous interaction between local frames and browser privacy boundaries. We distill 19 cross-tool vulnerability patterns rooted in the incompatibility between legacy web features (e.g., relaxed same-origin policy for `about:blank`) and modern privacy models. All six evaluated tools exhibit at least one exploitable flaw. Measurement across the top 10K websites reveals that 56% employ local frames, and among them, 14.3% host malicious requests that bypass intended filtering—demonstrating widespread real-world impact.
📝 Abstract
We present a study of how local frames (i.e., iframes with non-URL sources like"about:blank") are mishandled by a wide range of popular Web security and privacy tools. As a result, users of these tools remain vulnerable to the very attack techniques they seek to protect against, including browser fingerprinting, cookie-based tracking, and data exfiltration. The tools we study are vulnerable in different ways, but all share a root cause: legacy Web functionality interacting with browser privacy boundaries in unexpected ways, leading to systemic vulnerabilities in tools developed, maintained, and recommended by privacy experts and activists. We consider four core capabilities supported by most privacy tools and develop tests to determine whether each can be evaded through the use of local frames. We apply our tests to six popular Web privacy and security tools, identifying at least one vulnerability in each for a total of 19, and extract common patterns regarding their mishandling of local frames. Our measurement of popular websites finds that 56% employ local frames and that 73.7% of the requests made by these local frames should be blocked by popular filter lists but instead trigger the vulnerabilities we identify; from another perspective, 14.3% of all sites that we crawl make requests that should be blocked inside of local frames. We disclosed the vulnerabilities to the tool authors and discuss both our experiences working with them to patch their products and the implications of our findings for other privacy and security research.