Make use of graphical glitches to exploit sensitive data from other tabs and apps. Works in browsers based on Chromium.
The glitch is only present on certain devices. See the list of affected devices.
- Open Chrome.
- Visit https://zznidar.github.io/expose-recently-rendered-data/www/ (open a few other tabs as well).
- During the first 40 ticks (a few seconds, depending on the device speed), the website will take canvas snapshots with javascript. During this time, switch between tabs and between applications (switch and go back to this tab).
- After 40 ticks, 40 buttons will appear. Press each of them to download the corresponding snapshot (I tried to automate this, but Chrome didn’t allow the site to automatically download 40 files).
- Look at the snapshots. Parts of recently rendered graphics will appear on certain snapshots.
The left number always shows the current tick. On the right, you can see the numbers of ticks when the website was resumed (i. e. when you changed back to that tab).
According to my tests, the glitches always appear on snapshots 2 and 3 ticks after the site is resumed. Sometimes parts of them are just transparent, other times they contain recently rendered data.
The following snapshot contains parts of some Twitter account which was opened just before switching back to the POF-tab:
Using this glitch, malicious websites could steal your private infomation.
Chrome Dev: affected Chrome: affected Chrome Canary: affected Firefox: unaffected Firefox Focus: (can only have 1 tab opened at a time) Opera: affected Opera Mini: unaffected (but: viewport size changes on switching tabs) Brave: affected