Closed
Bug 1418644
Opened 7 years ago
Closed 4 years ago
Username/password prompt can be used to hijack the browser
Categories
(Core :: Networking: HTTP, defect, P3)
Tracking
()
RESOLVED
WORKSFORME
People
(Reporter: koenigseggcc, Unassigned)
References
Details
(Whiteboard: [necko-triaged])
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0
Build ID: 20171112125346
Steps to reproduce:
I was sent a valid Yahoo (bad already, I know) link which eventually redirected to some malicious "Your computer is infected" page. The original link is normally valid, and is attached for reference, as is the bad one.
I clicked the original link, went through a couple of the pages listed, and got redirected. This only happened once. Yahoo seems to allow something to hijack connections occasionally.
Original link which was redirected from: https://ca.yahoo.com/news/every-car-weve-tested-hit-211403319.html
Bad link I was redirected to: http://seolosangelesservices.com/in/000ads8957402/?ads=6bcvru5m9y&sspid=%5BEXCHANGE%5D&cb=359427&referer=https%3A%2F%2Fca.news.yahoo.com%2Fevery-car-weve-tested-hit-211403319.html&p=000ads8957402&click=https%253A%252F%252Fclick-west.acuityplatform.com%252FAdserver%252Flanding%253Fbc%253D727071%2526position%253D3%2526bannerid%253D719924%2526campaignid%253D235588%2526mastercampaignid%253D85412%2526sizeid%253D3%2526exid%253D17%2526adid%253D0%2526xuid%253DYLyT9MqW.DLw3mVeSBQiuc1Y%2526agentcode%253D0%2526geocode%253D21%2526geostrcode%253D%2526siteid%253D20000228%2526inventoryid%253D49518081%2526pubid%253D0%2526reqid%253Db9da65d7-2f36-664a-bd63-3d545e327ff2%253A1511022143056%253A1%2526ip%253Dae583300%2526ts%253D15fcff026a8%2526test%253D0%2526rc%253D1%2526cnt%253DCA%2526rg%253DON%2526cty%253DAJAX%2526ert%253D0%2526erid%253D%2526ag%253D7%2526gnd%253D2%2526ca%253D0%2526bauid%253Dnull%2526cepid%253Dnull%2526cvt%253D0%2526uq%253D0%2526sg%253D0%2526sgs%253D%2526sgmt%253D%2526tt%253Db9da65d7-2f36-664a-bd63-3d545e327ff2%253A1511022143056%253A1%2526uaos%253D5%2526uab%253D7%2526dealid%253D0%2526pw%253D-1%2526ph%253D-1%2526ist%253D15fcff026a8%2526pl%253D0%2526vrt%253D0%2526vrl%253D%2526topics%253D20977%252C20210%252C20939%2526chnls%253D%2526lat%253D43.840393%2526long%253D-79.0251%2526sw%253D0%2526sh%253D0%2526dt%253D1%2526int%253D0%2526devid%253D1%2526landingUrl%253D&sitedomain=http%253A%252F%252Fyahoo.com&rand=null&pubid=0&siteid=20000228&location=https%3A%2F%2Fs.yimg.com%2Frq%2Fdarla%2F3-0-8%2Fhtml%2Fr-sf.html&dt1=0&dt2=0&dt4=2&dt5=2&dt6=0&dt7=0&dt8=10&dt9=NA&dt10=no%3A28%7Camazon.com%7Ccarbonmade%7Cbitbucket%7Cblogger%7Cfoursquare%7Chackernews%7Cdisqus%7Cgithub%7Cmeetup%7Cindeed%7Cpaypal%7Cstack%7Cmedium%7Ctumblr%7Cedx%7Cbattle.net%7Csquare%7Cflickr%7Ckhan_academy%7Cskype%7Cexpedia%7Cpinterest%7Cairbnb%7Cacademia.edu%7Cgoogle_plus%7Cvk%7Creddit%7C500px%3Bok%3A6%7Cyoutube%7Cgmail%7Cdropbox%7Cfacebook%7Cspotify%7Ctwitter%3Berr%3A1%7Csteam&dt11=1
Actual results:
Once the bad redirect happened, a basic html page loaded saying "Your computer is infected," with an audio version of the page playing, and brought up the username/password prompt.
Upon choosing to cancel the authentication request, the page reloads, bringing up the authentication prompt again.
You cannot interact with Firefox because the authentication prompt hijacks focus.
Expected results:
Firefox should allow you to ignore the prompt so that you can close the tab, or hit the back button
Updated•7 years ago
|
Group: firefox-core-security
Updated•7 years ago
|
Component: Untriaged → Networking: HTTP
Product: Firefox → Core
Updated•7 years ago
|
Status: UNCONFIRMED → NEW
Ever confirmed: true
Updated•7 years ago
|
Status: NEW → UNCONFIRMED
Ever confirmed: false
Comment 1•7 years ago
|
||
There is a number of ways to use this for focus hijack. We've already fixed one in the past (bug 1312243). The only true solution is to make the auth dialog tab-modal and not browser-modal as it is now.
Comment 2•7 years ago
|
||
Bug 613785 is filed for that. I don't think it's as simple as getting the prompt to show in-content like some other prompt service consumers since that would make the dialog easily spoofable by content.
See Also: → 613785
Comment 3•7 years ago
|
||
We could mitigate this particular vector by storing the abuse flags on the docshell instead of the document.
The 'Would you like Firefox to save this login' thing is per-tab, and would be hard to spoof. Would it not be sufficient to move all authentication prompts to this style?
Comment 6•4 years ago
|
||
Thanks for confirming!
Status: UNCONFIRMED → RESOLVED
Closed: 4 years ago
Resolution: --- → WORKSFORME
You need to log in
before you can comment on or make changes to this bug.
Description
•