Detecting uBlock origin via a timing side-channel
chrome extensions are bad, use firefox
I recently found a neat trick to check for the presence of Chrome extensions in a user's browser.
Chrome extensions often need to expose files to webpages (images, fonts, etc.) to webpages. These assets are listed in the extension's
manifest.json file under the
These assets then become available via the
chrome-extension:// URI, e.g.
In manifest v2, these assets are available to any webpage. This means any extension with
web_accessible_resources can be detected by a webpage. You could hypothetically fingerprint users by scanning for the presence of all every extension with
web_accessible_resources. Which, by the way, almost every major extension has a few.
However, in the recently introduced manifest v3, a developer can specify which hosts are allowed to read the assets. This is superior for security, as it prevents an arbitrary site from easily being able to enumerate your extensions.
uBlock origin has some
web_accessible_resources that it requires to be accessible to all origins, but it attempts to prevent them from being read via a network listener that blocks the request unless it contains a "secret token". However, this is easily detectable via timing as the network listener takes a significant amount of extra time to intercept the request :)
POC Code: https://github.com/arxenix/chrome-ublock-detection/blob/gh-pages/index.html