Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Flash as a browser extension? #71

Open
ROBERT-MCDOWELL opened this issue Aug 5, 2017 · 20 comments
Open

Flash as a browser extension? #71

ROBERT-MCDOWELL opened this issue Aug 5, 2017 · 20 comments

Comments

@ROBERT-MCDOWELL
Copy link
Contributor

ROBERT-MCDOWELL commented Aug 5, 2017

I don't know if this can be possible but another idea.
as an extension would maybe be a first step....

@My1
Copy link
Contributor

My1 commented Aug 5, 2017

well it has been a plugin for pretty much ever since it was used in the web so it is already at that point, but browsers are rejecting flash for primarily security reasons.

@ROBERT-MCDOWELL
Copy link
Contributor Author

ROBERT-MCDOWELL commented Aug 5, 2017

develop an extension that interprets swf and actionscript compiled does not mean that browsers
will interpret it as flash. And again, there is no more security holes than javascript or html5 today,
if you doubt it, please provide the link of these security holes and we'll inform developers about it.

@My1
Copy link
Contributor

My1 commented Aug 5, 2017

https://helpx.adobe.com/security/products/flash-player/apsb17-21.html
Last month we had yet another remote code execution hole that had to be patched

in June there were 2 Remote code vulnerabilities:
https://helpx.adobe.com/security/products/flash-player/apsb17-17.html

and more critical stuff before:
https://helpx.adobe.com/security/products/flash-player/apsb17-15.html

and as record of this year, in february we had 5 code execution vulnerabilities:
https://helpx.adobe.com/security/products/flash-player/apsb17-04.html

to summarie, each month this year (except august, which just begun at least one code execution hole had to be fixed:
https://helpx.adobe.com/security.html#flashplayer

I honestly havent heard much about remote code execution holes in browsers lately, but one thing is that usually the javascript based holes are usually failures in the browser implementation, meaning I can just switch to another browser in the meantime. this isnt really possible for flash.

and same as with Java or silverlight, these have as far as I get it, significantly more access on the system itself than you average Website without these plugins has, meaning more damage can be done.

@My1
Copy link
Contributor

My1 commented Aug 5, 2017

"develop an extension that interprets swf and actionscript compiled does not mean that browsers
will interpret it as flash"
you didnt say that in the first post, and I cant really read minds, sorry if I misunderstood your request.

@ROBERT-MCDOWELL
Copy link
Contributor Author

ROBERT-MCDOWELL commented Aug 5, 2017

Ok thanks for the official links of adobe, everyone knows this list I guess.
vulnerabilities in computer world always existed, and will endlessly exist.
now 2 or 3 security holes corrected weeks after is not a big deal compared to the long list of javascript vulnerabilities
https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-15031/opec-1/Google-Chrome.html
Now, again, if you are against flash open-sourced, why are you here? What's your goal to subscribe to our git repository?
When I mean Flash as browser extension, obviously developers will understand that I'm talking about SWF

@demurgos
Copy link
Collaborator

demurgos commented Aug 5, 2017

Oh please, you are being dishonest at the moment. @My1 provided you bugs from an official source backing his claims. If you check the very website you provided (CVE details), Flash is listed with 819 vulnerabilities Flash is listed with 1033 vulnerabilities (edit, see comment below by @My1), ten times more than Chrome (for a program that is arguably smaller than a full-fledged browser).

@My1
Copy link
Contributor

My1 commented Aug 5, 2017

I am not against flash being open sourced. I said before that as long as flash is not bot open and audited it's not a good option for relatively new stuff and if it should be used than just for old stuff that already exists.
also who knows since when the flash holes existed, honestly I dont know, and only with open source it's really possible to know since when.

also your nice list of chrome goes back to 2008, I honestly dont want to know how many holes flash had in the timespan of 7 years.

also @demurgos you have the wrong list. you list all bugs. we need just code execution, well actually most of flash's issues are code execution:
https://www.cvedetails.com/vulnerability-list/vendor_id-53/product_id-6761/opec-1/Adobe-Flash-Player.html
we have 819, just one below ten times the 82 chrome had.

@TahirMia
Copy link

TahirMia commented Aug 5, 2017

I think there are some flash extensions in the Chrome web store

@pakastin
Copy link
Collaborator

pakastin commented Aug 5, 2017

There's limitations what browser extensions can do. For example Chrome only accepts web technologies.

@demurgos
Copy link
Collaborator

demurgos commented Aug 5, 2017

Shumway was provided as a browser extension. It registered itself as a plugin handler (see this line).
Do you know if this sort of registration is possible with web extensions? (media type handler, extension handler) I guess that it would be possible to get a similar behavior by observing DOM mutations and intercepting <object> tags with an SWF source, but it would be easier if something was provided out of the box.

@pakastin
Copy link
Collaborator

pakastin commented Aug 5, 2017

I think it needs a proper plugin install to run native stuff with extensions, but I'm not sure.

@pakastin
Copy link
Collaborator

pakastin commented Aug 5, 2017

Native messaging could be one thing to use: https://developer.chrome.com/extensions/nativeMessaging

@zwetan
Copy link

zwetan commented Aug 6, 2017

@My1 the thing with security issues in software is that every single one has those.

Telling people that only Flash has security issues is misleading at best.
Worst, using that argument as an excuse to remove Flash altogether is a blatant lie.

It is simple as that:
any popular software will me more targeted than the others
for those security exploits, holes, flaws, remote execution, etc.

Not only Flash is popular but on top of that when it run inside a browser as a plugin
it can load a remote payload (like advertising) which make a particular juicy target
for all villainous crackers wanting to exploit it.

Now, it's been years I read in online magazine, even some so called security experts, etc.
generating this myth that Flash is much less secure than the other software
because "OMG we found so many CVE for it"

That is total bullcrap.

Every software got CVE: the Linux kernel got CVE, the Android OS got CVE, all the browsers got CVE, many operating systems got CVE, etc.

In fact, anything that is somewhat popular will have CVE.

You can find many CVE listed here:
http://www.cvedetails.com/

Here the top 50 Vendors
http://www.cvedetails.com/top-50-vendors.php
Microsoft, Oracle, Apple, Google, etc. are in front of Adobe

Here the top 50 Products
http://www.cvedetails.com/top-50-products.php
Linux kernel, Mac OS X, Chrome, Firefox, iPhone OS, Android
are all in front of Flash

so that part

but browsers are rejecting flash for primarily security reasons

that's the bullshit that browser vendors are selling you, while at the same time
their own browsers have more CVE than Flash.

Now look at the top 50 Products just for the year 2017
http://www.cvedetails.com/top-50-products.php?year=2017

hey Flash is only 27 on the list, but yet people are still bringing up that myth
that Flash is less secure than the rest

@zwetan
Copy link

zwetan commented Aug 6, 2017

Flash as a browser extension is not possible "as is"
you would need something like Shumway to run SWF, but Shumway is abandoned.

And the same browsers decided to remove plugins they can decide to remove extensions
or change the rules or whatever that fit their agenda.

For example, Google is not happy with all those "Ads blocker" extensions,
so they plan to lure people by integrating ad blocking inside Chrome
and probably plan to not allow ads blocker as extensions anymore.

@My1
Copy link
Contributor

My1 commented Aug 6, 2017

Well i never said that flash is the only thing with security problems. But a browser is pretty much supposed to be a "vm for websites" essentially making sure they dont get access on the system, in contrast flash essentially grants a lot more access to the computer than browsers do or at least did. It's pretty similar to java or silverlight in that aspect and both have been nuked earlier already, while flash is running on a grace period because it's still used too much to just nuke it.

Or why do you think browsers are removing flash and the other stuff?

Also that OSes are higher on the list is not too weird, after all they are a whole lot more complex and quite literally have to control the whole computer. Also unlike with linux or mac windows gets every version listed, although i think that in this case that is a bit overblown as the issues often pertain to multiple versions at once. Also the acrobat stuff from adobe also is listed multiple times, by crossing duplicates out, flash would get a lot higher.

Also the cves are bugs that have been found. Heartbleed for example was quite a while in the code. We don't know how many hidden bugs there are and people are losing interest in flash because it's half dead by now unlike the old times where flash autoplayed and you could do some really bad stuff, this isn't possible. You'd have to find someone gullible enough to actively start flash, even though it's hardly used anymore. Finding holes in the browsers is a lot nicer for the attackers and it gets easier when they are open source, and with open source a whole army of whitehats can help fixing the bugs as well, something not so easy with closed things like flash

@ROBERT-MCDOWELL
Copy link
Contributor Author

ROBERT-MCDOWELL commented Aug 6, 2017

My1: Well, WebRTC and javascript can have access to your system already, exactly like flash.
I think this debate continues to have non sense at all, since today choose between html5/javascript or flash is only a question of taste, my opinion is we need often both, at least for complex applications.
About security, Oh, and btw, there are now some patents that allow chipset of webcam, microphone, gps and others to continue to run even if you switch off your devcie and can be remotely controlled from distance.
also major issues with apple, windows and so on much more serious than flash

https://www.grahamcluley.com/webcam-spying-without-turning-led-researchers-prove-possible/
http://www.zdnet.com/article/how-to-stop-windows-10-spying-on-you/
https://popularresistance.org/new-intel-based-pcs-permanently-hackable/

So if you want to talk about security, let's start from the start, Hardware and Operating System.

I never said to convert Flash Player as an extension "as is", the beauty of the binary world
is that everything is possible as long as smart developers are behind it to create, solve and evolve any kind
of program (and btw, evolve together). About those who are obsessed with security, well, since 20 years no one died from windows 95, 98, XP, Vista, 7, and 10 today, although it has been thousands of security issue patches, so it's the same for flash. It's up to us, developers and users from all around the world to decide what is good or not for internet, not a consortium of brotherhood corporations covered up as an open source organization.
We can fix all the security issues, like any other programs, it's not a big deal.

@ROBERT-MCDOWELL
Copy link
Contributor Author

ROBERT-MCDOWELL commented Aug 6, 2017

for people who don't know what is PROMIS software, back door technology and so on here is another article

http://www.wnd.com/2013/06/nsa-has-total-access-via-microsoft-windows/
https://www.youtube.com/watch?v=Y41J-T0N-C0
if you want to talk about security so let's talk about it.

My1 "Or why do you think browsers are removing flash and the other stuff?"
oh, yeah, because of security issues? gotcha....

@greggman
Copy link

I just thought I should point out when comparing vulnerabilities it's important to look at what they actually are

Flash: https://www.cvedetails.com/product/6761/Adobe-Flash-Player.html?vendor_id=53

for 2015-2016 there were 478 code execution vulnerabilities

Chrome: https://www.cvedetails.com/product/15031/Google-Chrome.html?vendor_id=1224

for the same time period there were 10

The other vulnerabilities don't really matter. Getting DOSed? Just don't visit that page again. Getting Code Executed? Your machine is now infected.

Chrome never claimed to have less bugs than other software because there will always be bugs. Instead they engineered it so even if there are bugs they are far less likely to be able to own your machine. For example if your compare the CVEs for Safari, Firefox, Edge, and Chrome you'll see they all have about the same number of issues listed per year showing that bugs happen and at a similar rate for similar software. But, if you check what those issues actually are you'll see Chrome usually has 10x to 50x less Code Execution bugs (bugs that lead to your machine getting owned)

@My1
Copy link
Contributor

My1 commented Mar 28, 2018

@greggman Precisely what you said (not to forget I did mention it already). Code Execution is the worst of all you can get and when 80% of ALL flash bugs are CE we have a problem, while chrome only comes with 5,8%. which is a far better ratio.

@demurgos
Copy link
Collaborator

A good solution would be to load Flash with a JS script inside the webpage. It would be automatically sandboxed by the browser (but would have some restriction with cross-domain storage).

Are the code execution vulnerabilities still present for new JS-based extensions ? It may be a way forward.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants