Mozilla developers are working on a new Firefox feature to block the automated display of content that requires a plugin, like Flash videos, Java applets or PDF files. The update should protect users from attacks that exploit vulnerabilities in browser plugins to install malware on their computers.
Known as “click-to-play,” this feature is currently supported through browser add-ons, such as the popular NoScript Firefox security extension, as well as in other browsers like Google Chrome and Opera.
When click-to-play is enabled, the browser displays static images instead of an active plugin. Users must click on those images to authorize the loading of each element.
“A couple days ago I landed an initial implementation of ‘click-to-play plugins’ in desktop Firefox,” Mozilla software engineer Jared Wein said in a
blog post on Wednesday.
Wein’s implementation is available for testing in the latest Firefox nightly build, but there’s still work to be done. “I’m currently working on implementing the ability for plugin activation settings to be remembered on a per-site basis,” he said.
Wein hopes to finish developing the feature before the deadline for code submissions in Firefox 14, but there’s no guarantee that it will be included in that version.
Security experts agree that in theory, this feature is capable of preventing plugin-based attacks, and should be implemented in every browser. However, they point out that its effectiveness will ultimately depend on user behavior.
“Let’s not forget that there has been a similar implementation in Internet Explorer [the Internet Explorer Information Bar] that did not really make any difference, since users would always allow blocked content to be executed,” Bogdan Botezatu, a senior e-threat analyst at antivirus vendor BitDefender, said. “Similarly, users might allow click-to-play content as well, based on the mere assumption that they really have to have everything loaded on the page.”
Botezatu believes that keeping click-to-play as an opt-in feature will significantly reduce its overall efficiency, because most non-technical users will leave it disabled. However, having it enabled by default in the browser would not be a good idea either, because it could result in the same users missing content they actually need.
An alternative would be to have the browser automatically enable the feature when it detects that the required plugin is outdated, and to display the content normally if the plugin is up-to-date, Botezatu said. Firefox already checks for vulnerable plugins when it gets updated, so the mechanism to do this is already built into the browser.
Costin Raiu, director of the global research and analysis team at antivirus firm Kaspersky Lab, is also concerned about the impact of user behavior on the effectiveness of the click-to-play feature. “You leave the choice to the user, who generally, when presented with a broken picture or a dialog which says click to see the movie, will click it,” Raiu said. “Generally, best defenses work by taking this choice away from the user.”
Raiu believes that Mozilla should build a click-to-play whitelist for popular websites like YouTube or Dailymotion, so users don’t develop a reflex of approving plugin-based content without giving it much thought.
On the downside, if the feature becomes popular, it is likely to be abused by attackers who could use rogue click-to-play images to trick users into downloading malicious files that masquerade as video codecs or browser plugin updates.
This kind of abuse has happened in the past with the “What’s New” page, which gets displayed after every Firefox update, the Safe Browsing alert page, which appears when users attempt to access known malicious websites, or the Firefox plugin version check page, where users are informed about outdated plugins.
“I’m quite certain that the feature will be abused in social-engineering attacks, however, I don’t think the risk outweighs the benefit,” Raiu said. Botezatu feels the same way.
“Now is a good time to have a click-to-play feature, given the fact that web-based attacks have increased exponentially and – most importantly – are becoming cross-platform,” Botezatu said, pointing to
the recent attacks that exploited a vulnerability in the Java browser plugin to infect over 600,000 Mac OS X computers with the Flashback malware.