ISN2003 Assignment4 Group5
ISN2003 Assignment4 Group5
Submitted to:
Mr. Altay Zeynalov
Submitted by:
Executive Summary
This report addresses security vulnerabilities known as Cross-Site Leaks (XS-Leaks),
which are present in many internet browsers. The importance and impact of these
vulnerabilities lie in their potential to disclose sensitive personal information, representing
a significant information security concern. By evaluating the most common web browsers,
we aim to determine which ones may be considered safer for deployment in our corporate
environment.
Introduction
Thanks to security researchers, multiple Cross-Site Leaks vulnerabilities have been
identified in many popular web browsers. Furthermore, the availability of free, open
testing tools like xsinator.com allows us to conduct our own benchmarking to determine
which browser might be safer to use. This provides an advantage in improving our security
posture against malicious websites.
For this report, we will conduct tests on the following browsers to evaluate their rankings
according to xsinator.com
Browsers to be evaluated:
• Microsoft Edge
• Brave
• Mozilla Firefox
• Expected Outcome: Establish which browser offers the highest level of security
against XS-Leak vulnerabilities.
1. Microsoft Edge
2. Brave
Version: 128.0
Architecture: 64-bit
While reviewing the results of the tests, we found out that each browser got a timeout on
a given test, therefore suggesting a poor management of a XS-Leak vulnerability for the
browser, hence upon taking this into account, we could conclude that the browser with
least vulnerabilities and timeouts would signal for the most robust against XS-Leak
vulnerabilities as viewed in the graph below.
Our conclusion would be to recommend the user of Mozilla Firefox as it provided the best
handling of the XS-Leak test.
Technical Details of XS-Leak Vulnerabilities
XS-Leak Vulnerability
ContentDocument X-Frame Leak
COOP Leak
CORB Leak
CORP Leak
CSP Directive Leak
CSP Redirect Detection
CSS Property Leak
Download Detection
Event Handler Leak (Object)
Event Handler Leak (Script)
Event Handler Leak (Stylesheet)
Frame Count Leak
History Length Leak
Id Attribute Leak
Max Redirect Leak
Media Dimensions Leak
Media Duration Leak
Performance API Download Detection
Request Merging Error Leak
URL Max Length Leak
WebSocket Leak (FF)
• Example: A malicious site could embed another site in an iframe and detect if
certain sensitive information is displayed based on changes in the iframe’s size
or properties.
• Example: A malicious actor could open a sensitive page in a new tab and
attempt to interact with it despite the isolation, potentially gaining access to
restricted data.
• Example: A hacker might exploit a weak CSP to inject malicious scripts into a
webpage, stealing user data or taking control of their account.
8. Download Detection
• Explanation: Detecting when a user initiates a download can reveal
information about their actions or interests.
• Example: An attacker could infer how many sites a user has visited and use
this to tailor social engineering attacks.
• Example: A malicious site could infer that a user is watching a specific video
based on its dimensions.
Knittel, L., Mainka, C., Niemietz, M., Dominik Trevor Noß, & Schwenk, J. (2021).
https://doi.org/10.1145/3460120.3484739
https://www.bing.com/videos/search?q=how+to+set+browser+security+options&vi
ew=detail&mid=BDBB4FF86E6C935FD2FCBDBB4FF86E6C935FD2FC&FORM=
VIRE&PC=LCTS
Proof Page