Closed Bug 724650 Opened 12 years ago Closed 12 years ago

Malicious "YouTube" add-on

Categories

(Toolkit :: Blocklist Policy Requests, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: mhammell, Assigned: jorgev)

Details

Attachments

(1 file)

181.71 KB, application/octet-stream
Details
Attached file 20120206 youtube.zip
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_2) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.77 Safari/535.7

Steps to reproduce:

Installed the add-on from http://my-vod[.]net/you.xpi?d=3453453



Actual results:

Runs JS from add-on to inject http://staticserve/[.]org/code2.js

The JS is heavily obfuscated: http://jsunpack.jeek.org/dec/go?report=2187c0ce12f5e9045fd96b31a5dc713e57ff46a2

JS loads staticserve[.]org/web/f0.php

It keeps the list of FB pages to like in HTML5 localstorage under the key "fb_page<page_id>".

Page Ids found in local storage:
310675168978342 
271948462863187 

Has you like pages via POSTs to http://www.facebook.com/ajax/pages/fan_status.php?__a=1

Does a lot of CSS modification of the FB DOM.

Injects ads onto your news feed and other pages, wiping out Facebook's ads and sponsored stories.



Expected results:

It should not inject ads into Facebook or send likes on your behalf, without your consent.
<em:id>jid0-EcdqvFOgWLKHNJPuqAnawlykCGZ@jetpack</em:id>
Assignee: nobody → jorge
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
https://addons.mozilla.org/en-US/firefox/blocked/i62
Status: ASSIGNED → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Product: addons.mozilla.org → Toolkit
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: