Have you watched a YouTube video lately in a country where English is widely used?
If so, we’re willing to bet that you’ve seen an advert for Grammarly, an online spelling and grammar checker.
In fact, we’ll suggest you’ve seen the Grammarly ad many times, perhaps even very many times – we certainly have.
The ads seem to be working, with the product currently closing in on 1,000,000 installs in Firefox, and already claiming more than 10,000,000 in Chrome.
As the product pitch in the Firefox add-on store explains:
Once you register your new account, you will start to receive weekly emails with personalized insights and performance stats (one of our most popular new features). Working on a large project, an essay, or a blog post? No sweat. You can create and store all of your documents in your new online editor.
In other words, your Grammarly account ends up knowing a lot about you, and holding copies of a lot of what you’ve written.
A security hole in Grammarly could therefore tell crooks much more about you than you’d like them to know.
So, when prodigious Google bug-finder Tavis Ormandy turned his eagle eyes on Grammarly’s Chrome extension recently, he was surprised at what he found:
The Grammarly chrome extension […] exposes it’s auth tokens to all websites, therefore any website can login to grammarly.com as you and access all your documents, history, logs, and all other data.
(Yes, Tavis made the very mildly embarrassing mistake of writing it’s for its, but unsurprisingly he didn’t have Grammarly turned on to help him.)
An authentication token is a one-time cryptographic string that is set by a server as a browser cookie after you’ve successfully logged into a website.
Your browser sends that cookie back to the site with every subsequent web transaction, thus signalling to the server that it’s you coming back for more.
Without this sort of arrangement, you’d have to supply your username and password for every web request you wanted to make.
What’s supposed to happen is that:
- The connection from your browser to the server uses HTTPS (secure HTTP) so that the authentication token is kept secret. This prevents eavesdroppers from sniffing your network traffic and stealing the secret token.
If your authentication cookie leaked out to someone else, they could add it into their own web requests and the server would treat them as if they were you, because the server would assume that the imposter must already have supplied your username and password.
The Grammarly bug
Unfortunately – or perhaps fortunately, given that no one else seems to have found this before him – Ormandy realised that the Grammarly extension didn’t enforce the same-origin policy properly.
Ormandy reported the bug to Grammarly on Friday last week, but with the details hidden from public view for 90 days to give Grammarly a chance to fix the hole…
…which the company did over the weekend, publishing updated versions for both Chrome and Firefox.
That’s why the story of this bug has already been published, with the often-critical Ormandy saying:
Grammarly had fixed the issue and released an update to the Chrome Web Store within a few hours, a really impressive response time.
I’ve verified that Mozilla now also has the update, so users should be auto-updated to the fixed version. I’m calling this issue fixed.
If you’re a Gramarly user and you want to make sure you’ve received the patch already, the version numbers to look out for [at 2018-02-05T23:55Z] are: 14.826.1446 for Chrome and 8.804.1449 for Firefox.
Even bad bugs like this one, when dealt with rapidly and repsonsibly, can turn into good stories.
Source : Naked Security