Closed
Bug 1294438
(CVE-2016-9062)
Opened 9 years ago
Closed 8 years ago
Private browsing browser traces (android) in browser.db and wal file
Categories
(Firefox for Android Graveyard :: General, defect, P1)
Tracking
(firefox49 wontfix, firefox-esr45 unaffected, fennec51+, firefox50 fixed, firefox51 fixed)
RESOLVED
FIXED
Firefox 51
Tracking | Status | |
---|---|---|
firefox49 | --- | wontfix |
firefox-esr45 | --- | unaffected |
fennec | 51+ | --- |
firefox50 | --- | fixed |
firefox51 | --- | fixed |
People
(Reporter: dakhnod, Assigned: Grisha)
Details
(4 keywords, Whiteboard: [MobileAS][adv-main50+])
Attachments
(2 files)
58 bytes,
text/x-review-board-request
|
sebastian
:
review+
|
Details |
1.35 KB,
patch
|
Sylvestre
:
approval-mozilla-aurora+
Sylvestre
:
approval-mozilla-beta-
|
Details | Diff | Splinter Review |
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
Firefox for Android
Steps to reproduce:
I visited some sites (9gag.com, google.com, etc.) in inkognito mode on my Firefox client on Android (Ver. 48.0), 'grep'ed those domains from all files in "/data/data/org.mozilla.firefox/files/mozilla/****.default/" and got binary mathes in the files "browser.db" and "browser.db-wal". Although this requires root, still incognito mode should provide some protection, at least it shouldn't leave traces in persistant files.
Actual results:
root@A0001:/data/data/org.mozilla.firefox/files/mozilla/baro4nyl.default #
grep 9gag*
Binary file browser.db-wal matches
root@A0001:/data/data/org.mozilla.firefox/files/mozilla/baro4nyl.default #
Expected results:
root@A0001:/data/data/org.mozilla.firefox/files/mozilla/baro4nyl.default #
grep 9gag*
root@A0001:/data/data/org.mozilla.firefox/files/mozilla/baro4nyl.default #
Comment 1•9 years ago
|
||
Sebastian, can you investigate/forward this? Thanks!
Component: Untriaged → General
Flags: needinfo?(s.kaspari)
Product: Firefox → Firefox for Android
Summary: Inkognito browser traces → Private browsing browser traces (android) in browser.db and wal file
Comment 2•9 years ago
|
||
Local attacker can also access other persisted data on operating system outside of Fx's control, hence unhiding and rating sec-low.
Group: firefox-core-security
Keywords: sec-low
Is there anything going to happen here? I am pretty sure many people really want to be able to use Inkognito mode without having to be afraid of leaving a history of their activities.
Comment 4•9 years ago
|
||
@grisha: Can you investigate what we are actually storing and what's causing this?
tracking-fennec: --- → ?
Flags: needinfo?(s.kaspari) → needinfo?(gkruglov)
Priority: -- → P1
Assignee | ||
Comment 5•9 years ago
|
||
(In reply to Daniel D. from comment #0)
> I visited some sites (9gag.com, google.com, etc.) in inkognito mode on my
> Firefox client on Android (Ver. 48.0), 'grep'ed those domains from all files
> in "/data/data/org.mozilla.firefox/files/mozilla/****.default/" and got
> binary mathes in the files "browser.db" and "browser.db-wal". Although this
> requires root, still incognito mode should provide some protection, at least
> it shouldn't leave traces in persistant files.
I take it you started off with a fresh profile? Otherwise, if you visited these pages prior, there will be matches. It's an obvious condition of course, but I just wanted to clarify.
I'll take a look into this and report back.
Forgot to mention that, i did clear the apps data through settings as well as reinstalling the app, and made the grep-tests before and after only visiting those websites in Inkognito mode.
Updated•9 years ago
|
Assignee: nobody → gkruglov
tracking-fennec: ? → 51+
Assignee | ||
Comment 7•8 years ago
|
||
I've tried this in the current nightly (51) and in the latest aurora (50.0a2) - two builds I could easily get a hold to run in an i386 emulator - and I can certainly reproduce this.
Culprit seems to be the metadata table. After browsing in the private mode, I see entries for the visited URLs in there.
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Flags: needinfo?(gkruglov)
Comment hidden (mozreview-request) |
Assignee | ||
Comment 9•8 years ago
|
||
Attached patch is probably enough - however, I can't reproduce this at all anymore to ensure :/ As far as I can tell, this is the only place where we actually write into the metadata table, so just marking this as a no-op for the PrivateTab seems sufficient.
Assignee | ||
Updated•8 years ago
|
Whiteboard: [MobileAS]
Comment 10•8 years ago
|
||
mozreview-review |
Comment on attachment 8787062 [details]
Bug 1294438 - Do not store metadata for private tabs
https://reviewboard.mozilla.org/r/75898/#review73914
Attachment #8787062 -
Flags: review?(s.kaspari) → review+
Comment 11•8 years ago
|
||
Pushed by gkruglov@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/4c0092cbaf25
Do not store metadata for private tabs r=sebastian
Assignee | ||
Comment 13•8 years ago
|
||
Sure, as soon as it lands on m-c I guess.
Comment 14•8 years ago
|
||
bugherder |
Status: ASSIGNED → RESOLVED
Closed: 8 years ago
status-firefox51:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → Firefox 51
Assignee | ||
Comment 15•8 years ago
|
||
Let's definitely uplift this into Aurora, and perhaps Beta? Not sure if last week is too late for sec-low fixes to be uplifted.
[Feature/regressing bug #]: private browsing
[User impact if declined]:
Opening private tabs sometimes persists metadata information about the tab, specifically page URL and an icon url. This information is stored, along with a timestamp, in browser.db->metadata table.
If there's root access to the device, it might be possible to see some information about private tabs that were opened.
Note that metadata is not always stored for a tab (I'm not quite sure what the required conditions are), so this bug doesn't always leak private browsing information - but it has the potential.
[Describe test coverage new/current, TreeHerder]: Manual testing.
[Risks and why]: Low to medium risk; private tab's method to store metadata was overridden to be a no-op. "Store metadata" action is triggered from within Gecko, and I don't have a full understanding of conditions under which it decides to store this information. From manual testing there isn't any visible impact though.
[String/UUID change made/needed]: N/A
Flags: needinfo?(gkruglov)
Attachment #8787813 -
Flags: approval-mozilla-beta?
Attachment #8787813 -
Flags: approval-mozilla-aurora?
Updated•8 years ago
|
status-firefox49:
--- → wontfix
status-firefox50:
--- → affected
Comment 16•8 years ago
|
||
Comment on attachment 8787813 [details] [diff] [review]
private-browsing.patch
Too late for beta but happy to take it in 50
Attachment #8787813 -
Flags: approval-mozilla-beta?
Attachment #8787813 -
Flags: approval-mozilla-beta-
Attachment #8787813 -
Flags: approval-mozilla-aurora?
Attachment #8787813 -
Flags: approval-mozilla-aurora+
Comment 17•8 years ago
|
||
bugherder uplift |
Updated•8 years ago
|
Flags: sec-bounty?
Comment 18•8 years ago
|
||
This is really more of a sec-moderate (on the lowish end). We should uplift to Aurora at least.
Flags: sec-bounty? → sec-bounty+
Assignee | ||
Comment 19•8 years ago
|
||
(In reply to Daniel Veditz [:dveditz] from comment #18)
> This is really more of a sec-moderate (on the lowish end). We should uplift
> to Aurora at least.
It's already in aurora.
Updated•8 years ago
|
Iteration: --- → 1.3
Updated•8 years ago
|
status-firefox-esr45:
--- → unaffected
Whiteboard: [MobileAS] → [MobileAS][adv-main50+]
Updated•8 years ago
|
Alias: CVE-2016-9062
Reporter | ||
Comment 20•8 years ago
|
||
Hi,
just so i know, will there be anything related to the hall of fame?
Best regards,
Daniel D.
Comment 21•8 years ago
|
||
If you have general questions, please write to security@mozilla.org rather than commenting in bugs. Thanks.
Updated•4 years ago
|
Product: Firefox for Android → Firefox for Android Graveyard
Updated•9 months ago
|
Keywords: reporter-external
You need to log in
before you can comment on or make changes to this bug.
Description
•