Researcher Exposes Critical Vulnerability in Arc Browser's Boost Feature
- A security researcher has discovered a serious flaw in the Arc browser that could have put users at risk.
- The issue, identified as CVE-2024-45489, was found in Arc's Boost feature, which allows users to customize websites.
- Thankfully, the vulnerability was patched on August 26, and no users were harmed.
A researcher, known as "xyz3va" on X (formerly Twitter), uncovered a critical flaw that could have put countless users at risk. Imagine browsing your favorite website, thinking everything is fine, while an attacker secretly takes control of your browser. Scary, right? That’s exactly the kind of danger this bug posed.
The issue stemmed from a misconfiguration in Arc’s connection to Firebase, a backend service supported by Google. It was a hidden vulnerability that could have easily gone unnoticed, but xyz3va’s sharp instincts and attention to detail made all the difference.
On August 25, while experimenting with Arc’s Boost feature, she discovered something alarming. By manipulating user IDs, a potential attacker could inject malicious code into a browser. If someone unknowingly visited a specific website, the attacker could hijack their browser session without them ever realizing it.
Arc didn’t waste a moment once the flaw was reported. By the very next day, they had patched the vulnerability and made significant updates to their security. They disabled JavaScript on synced Boosts and decided to move away from Firebase for future developments—a bold step to ensure better safety.
To prevent similar issues in the future, Arc took things a step further. They launched an external audit of their system and committed to regular security checks every six months. This wasn’t just a quick fix; it was a complete shift in their approach to user safety.
What’s remarkable is how Arc treated this incident as an opportunity to grow. Instead of brushing it under the rug, they used it as a wake-up call. They’ve strengthened their security measures and revamped their bug bounty program, offering rewards like the $2,000 given to xyz3va for her discovery.
This was Arc’s first major security scare, but it’s clear they’re determined to turn it into a learning experience. For their users, this means a safer, more secure browsing future—and for researchers like xyz3va, a well-deserved moment in the spotlight for making the internet a safer place.
While this incident could have been disastrous, Arc handled it with transparency and quick action. It’s a reminder that even the most advanced tools can have flaws, but what matters is how they’re fixed and the lessons learned. With these new improvements, Arc is determined to make sure something like this doesn’t happen again, keeping their users safe and secure.