If so, be advised that the developer recently reported that a critical flaw in the extension could allow hackers to access user information from third party online services.
Online security company Guardio discovered the flaw and had this to say:
“Due to Evernote’s widespread popularity, this issue had the potential of affecting its consumers and companies who use the extension – about 4,600,000 users at the time of discovery.”
The issue is being traced as CVE-2019-12592 and is a Universal Cross-Site Scripting (UXSS) coding error that makes it possible for an attacker to, in the words of Guardio’s research team, “bypass the browser’s same origin policy, granting the attacker code execution privileges in Iframes beyond Evernote’s domain.”
Once Chrome’s Site Isolation security feature is circumvented, account data from other websites the user visits using Chrome, “including authentication, financials, private conversations in social media, personal emails, and more” are vulnerable and can be harvested with ease.
According to Guardio’s CTO Michael Vainshtein:
“The vulnerability we discovered is a testament to the importance of scrutinizing browser extensions with extra care. People need to be aware that even the most trusted extensions can contain a pathway for attackers. All it takes is a single unsafe extension to compromise anything you do or store online. The ripple effect is immediate and intense.”
Guardio reported the issue to Evernote on May 27th and the company moved quickly to patch the code. At this point, the only thing you need to do in order to be sure you’re protected is check the version of your Evernote extension. If you’re using version 7.11.1 or later, you’re all set. Updating this extension should be given your highest priority. The risks of exposure are enormous.