uBlockOrigin / uAssets

Resources for uBlock Origin, uMatrix: static filter lists, ready-to-use rulesets, etc.
GNU General Public License v3.0
4.15k stars 773 forks source link

Suspicious Akamai tracking script on multiple websites #10012

Closed ImBoop closed 3 years ago

ImBoop commented 3 years ago

Prerequisites

I tried to reproduce the issue when...

URL(s) where the issue occurs

https://www.tacobell.com/food/ Other examples listed on blog post below.

Describe the issue

It seems Akamai is starting to push sketchy trackers that are fingerprinting the browsers they're on under the guise of 'bot detection' and the script is very heavily obfuscated, and uBlock doesn't currently block them.

Screenshot(s)

No response

uBlock Origin version

1.37.2

Browser name and version

Firefox 92.0

Settings

Notes

It seems to be rather secretive as to how it works, but theres a decent writeup on https://grantwinney.com/websites-requesting-access-to-motion-sensors/

Even if it breaks the website, I'd like ublock to block these sketchy requests (which if they weren't on the host page then it wouldn't need to be so secretive.)

uBlock-user commented 3 years ago

and uBlock doesn't currently block them.

link to the script ?

ImBoop commented 3 years ago

https://www.tacobell.com/A2TJx7gO/ElEpY06/xt2DbaR/dN/if1OwNhziuaf/PVQiZgE/Owl/PBBxLcHwB

If it dies I can mirror it in a gist.

ExtremelyCool commented 3 years ago

@ryanbr

ryanbr commented 3 years ago

These scripts are all over the place, have tried to counter them. But they keep changing the urls.

avotoko commented 3 years ago

The script is sending data twice on www.fedex.com.

ss1-e ss2-e

If necessary, these can be blocked with the following filter.

fedex.com##+js(set, bmak.js_post, false)
avotoko commented 3 years ago

grantwinney's article has an interesting comment: https://grantwinney.com/websites-requesting-access-to-motion-sensors/?ht-comment-id=152099. It has been suggested that blocking it may have negative effects.

I wish I could have reported this in my earlier post, but I apologize for the delay.

uBlock-user commented 3 years ago

We could always remove it if any one experiences site breakage due to that filter, but they shouldn't because the value is within valid parameters.

ImBoop commented 3 years ago

The script is sending data twice on www.fedex.com.

The domain changes frequently, is there no other way to block it?

uBlock-user commented 3 years ago

which domain ?

ImBoop commented 3 years ago

In the script in my link, the script went to tacobell.com (e.g. the host domain of the script.)

uBlock-user commented 3 years ago

I don't understand, XHR's are no longer fired, fixed in https://github.com/uBlockOrigin/uAssets/commit/1bd833f697135792336d8697dafaf8a0afb9f4ef

ImBoop commented 3 years ago

I don't understand, XHR's are no longer fired, fixed in 1bd833f

I just meant that it's on other domains as well, but I don't have a definitive list unfortunately. Appreciate it either way, thanks!

maxredspeed3 commented 3 years ago

We could always remove it if any one experiences site breakage due to that filter, but they shouldn't because the value is within valid parameters.

It's breaking fedex.com proper when signing in. I use FedEd daily for work with uBO installed, haven't had any issues for over a year, until about 2 weeks ago when this was added. I currently have to whitelist fedex.com entirely or turn uBO off just to sign in. After signing in, everything else in the site works fine, no issues.

image image

uBlock-user commented 3 years ago

@maxredspeed3 Add the following filters to my Filters and try loggin in again.

fedex.com#@#+js(set, bmak.js_post, false)
fedex.com##+js(aost, XMLHttpRequest.prototype.send, apicall_bm)