Closed
Bug 1305208
Opened 9 years ago
Closed 9 years ago
Background application can steal arbitrary web contents through reader-mode
Categories
(Firefox for iOS :: Reader View, defect, P1)
Tracking
()
RESOLVED
FIXED
Iteration:
1.10
People
(Reporter: sdna.muneaki.nishimura, Assigned: bnicholson)
Details
(Keywords: csectype-sop, reporter-external, sec-high, Whiteboard: [MobileAS])
Attachments
(2 files)
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/602.1.50 (KHTML, like Gecko) Version/10.0 Safari/602.1.50
Steps to reproduce:
Reader-mode in Firefox for iOS is hosted on a local web server and readerized web pages can be accessed through following URL.
http://localhost:6571/reader-mode/page?url=https://blog.mozilla.org/security/
This local server runs while in foreground but then background application can access it too.
This means that it can be used for stealing user private web contents from other application.
If you run Firefox for iOS on a Similator on macOS you can reproduce an attack scenario like this.
1) Log in to Github by Firefox for iOS on Simulator
2) Launch terminal application on macOS.
3) Execute "curl http://localhost:6571/reader-mode/page?url=https://github.com/notifications" twice
4) The curl response may contain your private Github notification messages
If you want to reproduce an attack scenario on your device, you need to install an application that implements similar logic to the above.
You can also reproduce it by using "Mercury Browser" application like this.
1) Log in to Facebook on Firefox for iOS
2) Install Mercury Browser on your iOS device
3) Send "steal.html" to your device as an e-mail attachment
4 [review]) Open steal.html by Mercury Browser
5) Push the button in steal.html
6) You can see your Facebook contents on Mercury Browser though you've never log in to Facebook on Mercury
The following URL is a video I reproduced these steps on my iPhone.
https://drive.google.com/open?id=0Bw1n4kKdVB6SQklMMEFmRnZVOXc
Actual results:
See above.
Expected results:
Readerized pages should not be accessed from other application.
Updated•9 years ago
|
Flags: sec-bounty?
Updated•9 years ago
|
Severity: normal → critical
Keywords: csectype-sop
Comment 1•9 years ago
|
||
Brian: we need to get this fixed ASAP. How can we get this on the release trains for iOS?
Flags: needinfo?(bnicholson)
| Assignee | ||
Comment 2•9 years ago
|
||
This sounds bad, and seems to conflict with the expected behavior described here: https://bugzilla.mozilla.org/show_bug.cgi?id=1201592#c4.
I flagged this as tracking-fxios=?, so this will come up during our next iOS triage on Tuesday.
tracking-fxios:
--- → ?
Flags: needinfo?(bnicholson)
| Assignee | ||
Comment 4•9 years ago
|
||
Looks like our triage query doesn't include security bugs, but I'll mark this as 6+ and P1. It'll be fixed by the next release (6.0).
Updated•9 years ago
|
Iteration: --- → 1.7
Updated•9 years ago
|
Rank: 1
Updated•9 years ago
|
Iteration: 1.7 → 1.8
Updated•9 years ago
|
Iteration: 1.8 → 1.9
| Assignee | ||
Updated•9 years ago
|
Assignee: nobody → bnicholson
Status: NEW → ASSIGNED
| Assignee | ||
Comment 5•9 years ago
|
||
I'm disappointed we didn't realize this sooner.
Attachment #8811481 -
Flags: review?(sarentz)
| Assignee | ||
Comment 6•9 years ago
|
||
Unfortunately, this fix does nothing to solve the related and even worse bug 1318155.
| Assignee | ||
Comment 7•9 years ago
|
||
dveditz pointed out that bug 1318155 isn't actually a big concern since it requires that a malicious app be installed, whereas this exploit can be triggered from arbitrary content in a third-party browser. I think this fix should be good enough for 6.0.
Updated•9 years ago
|
Attachment #8811481 -
Flags: review?(sarentz) → review+
| Assignee | ||
Comment 8•9 years ago
|
||
Status: ASSIGNED → RESOLVED
Closed: 9 years ago
Resolution: --- → FIXED
Updated•9 years ago
|
Iteration: 1.9 → 1.10
| Assignee | ||
Comment 9•9 years ago
|
||
v6.x: ac52599
status-fxios-v6.0:
--- → fixed
status-fxios-v7.0:
--- → fixed
Updated•9 years ago
|
Flags: sec-bounty? → sec-bounty+
Updated•9 years ago
|
Group: firefox-core-security → core-security-release
Updated•6 years ago
|
Group: core-security-release
Updated•1 year ago
|
Keywords: reporter-external
You need to log in
before you can comment on or make changes to this bug.
Description
•