Closed Bug 724669 Opened 12 years ago Closed 12 years ago

Malicious "Video Premium" add-on

Categories

(Toolkit :: Blocklist Policy Requests, defect)

defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 723753

People

(Reporter: mhammell, Assigned: jorgev)

Details

Attachments

(1 file)

25.19 KB, application/octet-stream
Details
Attached file 20120206 youtube2.zip
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_2) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.77 Safari/535.7

Steps to reproduce:

Installed the add-on from vayaina[.]in/video/budado/youtube.xpi


Actual results:

Add-on loads JS to inject http://budado.info/s.js, which injects
http://whos.amung.us/swidget/budado321.gif as an <img> tag and
http://budado.info/e/e.js as a <script> tag

E.js injects an <iframe> pointing to "http://famoso123.info/video/"+video+"/"+servidor+".html";, where video and servidor are provided at runtime.  The iframe is set to cover the webpage the victim is trying to navigate to.



Expected results:

It shouldn't inject an iframe into the user's tab, covering the intended page.
<em:id>youtb3@youtb3.com</em:id>
Assignee: nobody → jorge
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
This is the same ID as bug 723753. Can you confirm that you can still install this add-on without any warnings?
Status: ASSIGNED → RESOLVED
Closed: 12 years ago
Resolution: --- → DUPLICATE
I installed this one prior to filing the bug, no warnings or blocks popped up.
I just tried in several versions of Firefox and the block worked correctly. If you can consistently reproduce in a new profile, please let me know via email and we'll figure it out.
Product: addons.mozilla.org → Toolkit
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: