Vulnerability in the Arc

The importance of the security process in critical incidents

Matheus Vilas Boas

Matheus Vilas Boas

Nov 4, 2024

When dealing with security failures, the response process is as important as fixing the problem itself. A clear example of this was the vulnerability CVE-2024-45489, which affected the Arc browser.

This incident highlighted the need for quick and effective practices to mitigate the damage from a security exploitation.

How the bug was exploited:

The attack exploited the way Arc stored browser customizations (Boosts) in the Firebase database.

Boosts are JavaScript codes that allow customizing websites when visiting them. The vulnerability allowed an attacker not only to alter their own Boost but also to modify those of other users, if they knew the target's user ID.

In this way, the attacker could replace the original code with a malicious script that would execute in the victim's browser, compromising their browsing without them noticing.

Consequently, the attack allowed for arbitrary code execution, turning a harmless functionality into a dangerous tool for invading systems and stealing data, with devastating consequences.

The Impact of Malicious Exploitation:

If this vulnerability had been discovered by malicious actors, the consequences could have been disastrous.

Targeted attacks could steal sensitive information such as login credentials, or even manipulate online banking transactions.

Intruders could monitor users' activities in real-time, redirecting browsing to malicious sites, installing malware, or even compromising confidential corporate data to carry out extortion.

Remote access to the browser would also open doors to coordinated large-scale attacks, compromising numerous accounts and devices.

The Rescue: Arc's Response

The quick response from Arc was crucial in preventing further damage. The team fixed the vulnerability in less than 24 hours and implemented several preventive measures, including:

  1. Temporarily disabling browser customization.

  2. Reviewing Firebase security rules.

  3. Starting a bug bounty program to identify future vulnerabilities.

Lessons Learned:

The main lesson from this incident was the importance of speed and efficiency in responding to failures. Additionally, it emphasizes the need for continuous review of the technologies used by applications, such as Firebase, and the implementation of regular security audits to prevent future exploitations.

This case serves as an example that digital security should be taken seriously, and that implementing an effective incident response can not only mitigate risks but also protect a company's reputation.

contact

We are ready to transform your business.

contact

We are ready to transform your business.

contact

We are ready to transform your business.

Logo
endereço

Av. Marcos Penteado de Ulhoa Rodrigues, 939
Alphaville Industrial, Barueri - SP, 06455-000

cnpj

40.283.975/0001-99

social networks

Linkedin

Instagram

© Squadfy Tecnologia LTDA

2025

Logo
endereço

Av. Marcos Penteado de Ulhoa Rodrigues, 939
Alphaville Industrial, Barueri - SP, 06455-000

cnpj

40.283.975/0001-99

social networks

Linkedin

Instagram

© Squadfy Tecnologia LTDA

2025