Closed Bug 1435937 Opened 6 years ago Closed 6 years ago

WebExtension Firefox sync poisioning

Categories

(WebExtensions :: General, defect)

58 Branch
defect
Not set
normal

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1415644

People

(Reporter: francois.lajeunesse.robert, Unassigned)

References

Details

Attachments

(1 file)

1.91 KB, application/x-zip-compressed
Details
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0
Build ID: 20180128191252

Steps to reproduce:

Whenever a Firefox instance haven't been sync yet, a malicious extension with a content script host that includes https://account.firefox.com (for example: "https://*.firefox.com/*") can bind the instance to a malicious account. Therefore, one can poison bookmarks, tabs, preferences, etc. or retrieve data from the victim.

In particular preference poisoning can lead to several security issues (for example see BUG 1430980, BUG 1431581). Moreover, with BUG 1430980, it is possible to access file on the filesystem using the technique described in BUG 1435933 without requiring the tabs.executeScript privilege in about:newTab or about:home.


Actual results:

The attachment is a extension POC which upon loading will open a new tab to https://accounts.firefox.com set the username and password defined in background.js and submit the form.

If the Firefox instance haven't been sync yet no warning will show up and Firefox will be sync to the malicious account.


Expected results:

Firefox sync related URL should be considered has privileged ressources in respect of WebExtensions.
:jkt, how is your work on bug 1415644 going?
Group: firefox-core-security → toolkit-core-security
Component: Untriaged → WebExtensions: General
Flags: needinfo?(jkt)
Product: Firefox → Toolkit
I was reworking the patch to take any number of hostnames to restrict upon. I'm working around a compiler error at the moment. I'll prioritise this over other work.
This would be fixed by bug 1415644 (prevent addons from accessing accounts.firefox.com).
Status: UNCONFIRMED → RESOLVED
Closed: 6 years ago
Depends on: CVE-2018-5152
Resolution: --- → DUPLICATE
Flags: needinfo?(jkt)
Product: Toolkit → WebExtensions
Group: toolkit-core-security → firefox-core-security
Group: firefox-core-security
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: