Closed Bug 1457491 Opened 7 years ago Closed 7 years ago

PSM IPC allows compromised child process to install new root certificates

Categories

(Core :: Security: PSM, enhancement)

enhancement
Not set
normal

Tracking

()

RESOLVED INVALID
Tracking Status
firefox61 --- affected

People

(Reporter: Alex_Gaynor, Unassigned)

Details

Given a compromised child process (aka the threat model for the parent process :-)), the following sequence of IPC methods allows the hostile actor to achieve persistence via inserting new root certificates into the trust store: - Create a new PSMContentDownloader from the ContentParent: https://searchfox.org/mozilla-central/source/dom/ipc/ContentParent.cpp#3446-3452 the attacker can control aCertType - Pass data to the PSMContentDownloader with OnStartRequest + OnDataAvailable: https://searchfox.org/mozilla-central/source/security/manager/ssl/PSMContentListener.cpp#224-238 - Finally complete the request https://searchfox.org/mozilla-central/source/security/manager/ssl/PSMContentListener.cpp#240-249 - https://searchfox.org/mozilla-central/source/security/manager/ssl/PSMContentListener.cpp#164-191 I'm not sure what the goal for this code is, but it's a pretty serious violation of the sandbox's threat model.
Hmmm, it looks like there's actually some UI associated with this that the parent unconditionally displays. Perhaps this isn't an issue after all... would appreciate some other folks thoughts.
After spending some more time with this, all the IPC functionality here is directly web accessible, so while it scares me, it's not an ipc-sec issue.
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → INVALID
Group: core-security
You need to log in before you can comment on or make changes to this bug.