Security Review: Return-to-AMO
Categories
(Firefox Graveyard :: Security: Review Requests, enhancement)
Tracking
(Not tracked)
People
(Reporter: cr, Assigned: pauljt)
References
()
Details
(Whiteboard: review)
Reporter | ||
Updated•7 years ago
|
Assignee | ||
Comment 1•7 years ago
|
||
Assignee | ||
Comment 2•7 years ago
|
||
Assignee | ||
Updated•7 years ago
|
Assignee | ||
Updated•7 years ago
|
Assignee | ||
Comment 3•7 years ago
|
||
We discussed security review in several other bugs (1511173, 1511104), and I think we are basically complete as far as security review of this feature goes. Our notes are captured in the document here:
https://docs.google.com/document/d/1u_TcLFQ3e7Gn4UhotyGLpz2J9NnmScD11NaRm_3gaDE/edit#
The main risk focused on with this review as "could this flow be used by an attacker to coerce a user into installing a malicious add-on"? While it's possible (as its possible for AMO addons to be malicious), but I think its unlikely to be a useful attack vector for an attacker (as compared to just a regular phishing site encouraging a user to install a malicious executable). The factors that lead me to this assessment are:
- this flow can only be used to prompt for installation of an addon, there is still user involvement in the install
- Its only possible for publicly listed add-ons (no unlisted add-ons)
- It applies only to users who do NOT already have Firefox
It's noted that as the design currently stands it would be possible for a 3rd party to take a link which generates the a stub-installer for a specific add-on and send that anywhere. It might be possible to mitigate this by www.mozilla.org checking the referrer of a link [1]. But this seems an unlikely attack vector due to the considerations listed above.
Just also to note for posterity, at the time of writing there is still ongoing discussion in 1511104 as to the need to sign parameters coming from AMO, so that www.mozilla.org could verify the link was generated by AMO. I think this is good defense in depth to limit the attack surface on www.mozilla.org download page, but as pointed out in 1511104#c55, this link could always be copied and used elsewhere.
[1] a recommendation has been provided in https://bugzilla.mozilla.org/show_bug.cgi?id=1511104#c58
Comment 4•7 years ago
|
||
PLOT TWIST (repeating from 1511104):
OK, so we're going to whitelist extensions on the API side of things.
So links will remain populated with all the params (so attribution will not be disrupted, just adding the utm_content param), but the API will only respond when the request is from an extension on the whitelist.
No changes required in FF or Bedrock (this bug), change to AMO side off trains.
This will constrain that risk to a list that we are already maintaining. This should mitigate as much risk as possible.
Comment 5•7 years ago
|
||
Will this bug require any manual validation from the QA team? if yes please provide some info on how to correctly validate, thanks!
Assignee | ||
Comment 6•7 years ago
|
||
(In reply to Vlad Jiman from comment #5)
Will this bug require any manual validation from the QA team? if yes please provide some info on how to correctly validate, thanks!
No, I don't think so. There is nothing to verify in Firefox, the change here is on the AMO side, and I would expect changes to the AMO API would have appropriate tests to validate their functionality.
Updated•7 years ago
|
Updated•5 years ago
|
Description
•