Cross-posted from SophosLabs: A popular Firefox add-on appears to have started leaking private information about every website that users visit to a third-party server, including sensitive data which could identify individuals or reduce their security.
Naked Security reader Rob Sanders alerted us to the activities of the recently updated ShowIP add-on for the Firefox browser.
According to the description on the Mozilla add-ons website, ShowIP is designed to “show the IP address(es) of the current page in the status bar. It also allows querying custom information services by IP (right click) and hostname (left click), like whois, netcraft, etc. Additionally you can copy the IP address to the clipboard.”
Currently over 170,000 people are said to be using ShowIP.
What the add-on’s description doesn’t say is that since version 1.3 (released on April 19th 2012) it has also sent – unencrypted – the full URL of sites visited using HTTPS, and sites viewed in Private Browsing mode, to a site called ip2info.org.
The user never realises that the data has been shared with a third-party, unless they use special tools to monitor what data is being sent from their computer.
SophosLabs researcher Xiaochuan Zhang examined the add-on, and observed the potential privacy breach in action. In the following example, he used Wireshark to view the network packets being sent and observed his request to visit a non-existent website “www.thisisapparentlyafakeservice.me” being shared with ip2info.org.
The full URL of every webpage visited is sent to the Germany-based ip2info.org website, using unencrypted connections.
In addition, the add-on has no warning that sites you visit might be disclosed, no privacy policy small print explaining its behavior, and no apparent way to opt-out of the data-sharing.
Sanders told Naked Security that the issue was reported on the add-on’s Google Code project page on 22nd April, but has received no response. Despite the alert, version 1.4 of the ShowIP add-on has since been released – and still exhibits the same behavior.
Sanders said that he hoped the apparent privacy lapse was the case of naivety rather than a developer with more malicious intentions:
“I suspect it’s the work of a very naive developer, but who knows nowadays. What bothers me most is how this code managed to get approved on the Mozilla Addons site (not once, but twice) and how it’s still there 12 days later."
The ip2info.org website itself appears to be very new, having only been registered a month ago.
And who appears to have registered the domain? A Berlin-based link marketing firm.
Hmm.
We have asked the developers of ShowIP to comment on the apparent privacy issue, and will update this article with any response we receive.