My browser got hacked and it cost me $2,000
Summary
TLDRIn this video, the presenter discusses a security vulnerability in the Arc browser, exploited by hacker Eva, allowing arbitrary JavaScript execution using only a user ID. The flaw was due to improper permissions in Firebase's Firestore database. After Eva's discovery, the browser company responded quickly, patched the issue, and increased the bounty from $2,000 to $20,000. The video also commends the company's transparency and commitment to improving security.
Takeaways
- 🌐 The speaker uses a unique browser called Arc, which is Chrome-based but with a different workflow.
- 👨💻 Hacker Eva exploited a vulnerability in Arc's use of Firebase, allowing her to run arbitrary JavaScript on the speaker's browser.
- 🔑 A user's ID was all that was needed to exploit the browser, which was obtained through a referral link.
- 🛠️ The exploit involved Arc Boosts, a feature that allows users to customize websites with custom CSS and JavaScript.
- 🔒 The security flaw was due to improper permissions settings in Firebase, which did not restrict the Creator ID field properly.
- 💸 The initial bounty offered by Arc for this exploit was $2,000, which the speaker considered insultingly low and decided to match.
- 📈 In response to the incident, Arc increased the bounty to $20,000 and offered Eva a job.
- 🔄 Arc committed to moving off Firebase for new features and conducting an internal audit of their Firebase ACL rules.
- 🔄 The company also planned to conduct external security audits and start a bug bounty program to address further vulnerabilities.
- 📢 The speaker publicly acknowledged the issue and praised Eva's work in making the web safer.
Please replace the link and try again.
Outlines

This section is available to paid users only. Please upgrade to access this part.
Upgrade NowMindmap

This section is available to paid users only. Please upgrade to access this part.
Upgrade NowKeywords

This section is available to paid users only. Please upgrade to access this part.
Upgrade NowHighlights

This section is available to paid users only. Please upgrade to access this part.
Upgrade NowTranscripts

This section is available to paid users only. Please upgrade to access this part.
Upgrade NowBrowse More Related Video

How an incredibly amateur mistake left Arc Browser wide open to hackers

Don't make random HTTP requests.

researchers find an unfixable bug in EVERY ARM cpu

Digital Certificates Explained - How digital certificates bind owners to their public key

What is Vulnerability?

The "9.9" Linux Vulnerability Revealed: It's The Printers
5.0 / 5 (0 votes)