Full URL spoof and/or SSL lock spoof using event handlers and redirect stalling
Categories
(Core :: DOM: Navigation, defect, P2)
Tracking
()
People
(Reporter: qab, Assigned: Gijs)
References
Details
(Keywords: csectype-spoof, reporter-external, sec-moderate, Whiteboard: [Fixed by Bug 1718571])
Attachments
(8 files)
Comment 1•6 years ago
|
||
Reporter | ||
Comment 2•6 years ago
|
||
Reporter | ||
Comment 3•6 years ago
|
||
Updated•6 years ago
|
Reporter | ||
Comment 4•6 years ago
|
||
Reporter | ||
Comment 5•6 years ago
|
||
Reporter | ||
Updated•6 years ago
|
Reporter | ||
Updated•6 years ago
|
Reporter | ||
Comment 6•6 years ago
|
||
Reporter | ||
Updated•6 years ago
|
Comment 7•6 years ago
|
||
Reporter | ||
Comment 8•6 years ago
|
||
Reporter | ||
Comment 9•6 years ago
|
||
Updated•6 years ago
|
Comment 10•6 years ago
|
||
Reporter | ||
Comment 11•6 years ago
|
||
Reporter | ||
Comment 12•6 years ago
|
||
Friendly ping for an update. Is it possible to fix stable release with whatever fixed the SSL spoof bug on nightly?
If that was unintentional I'll be happy to run mozregression and find out so we could at least fix the bigger bug of the two on stable.
Assignee | ||
Comment 13•6 years ago
|
||
(In reply to Abdulrahman Alqabandi from comment #12)
If that was unintentional I'll be happy to run mozregression and find out so we could at least fix the bigger bug of the two on stable.
I think either way (ie intentional or not) it'd be helpful to figure out what fixed this, so if you have time to do that that'd be great. I'm a little confused because comment #11 was 5 months ago so any "normal" changes on nightly should at least be on beta right now if not release (and I'm assuming, per your comment, that 65 on beta/release/rc is still vulnerable)... so yes, running mozregression with --find-fix might be illuminating here.
Reporter | ||
Comment 14•6 years ago
|
||
Ok it does not work on stable 64.0.2 (64-bit) I think when i first updated, it updated to 63.x where it worked or i just made a wrong assumption. So never mind comment 12!
Seems to be fixed on stable.
Assignee | ||
Comment 15•6 years ago
|
||
(In reply to Abdulrahman Alqabandi from comment #14)
Seems to be fixed on stable.
OK, to be clear, you mean the lock spoof is fixed, but this still leaves the URL spoof, right?
Reporter | ||
Comment 16•6 years ago
|
||
(In reply to :Gijs (he/him) from comment #15)
(In reply to Abdulrahman Alqabandi from comment #14)
Seems to be fixed on stable.
OK, to be clear, you mean the lock spoof is fixed, but this still leaves the URL spoof, right?
Yes, the URL spoof still works on latest nightly and 64.0.2 (64-bit). Though the only content that can be shown to extract any useful data from potential victim is a pompt().
Reporter | ||
Comment 17•6 years ago
|
||
Also, I will look for the bug responsible for fix. Will update soon.
Reporter | ||
Comment 18•6 years ago
|
||
Looks like this was fixed by bug 832834, will attach logs from mozregression in case its useful.
Reporter | ||
Comment 19•6 years ago
|
||
Perhaps I should file a new bug to handle the full url spoof and consider this bug as the SSL spoof?
Thoughts?
Assignee | ||
Comment 20•6 years ago
|
||
(In reply to Abdulrahman Alqabandi from comment #19)
Perhaps I should file a new bug to handle the full url spoof and consider this bug as the SSL spoof?
Thoughts?
I'd prefer to keep it together, though I wonder if we could write an automated testcase for the ssl spoof so we don't inadvertently break it again... Dana, looks like you "accidentally" fixed this by making the nsSecureBrowserImpl stuff much more sane. Interested in doing a testcase in a separate bug?
I also just realized that:
(In reply to Kyle Machulis [:qdot] [:kmachulis] (if a patch has no decent commit message, automatic r-) from comment #10)
This looks similar to other bugs we're working on right now but I still
don't want to dupe it quite yet, as I think the SSL Lock Icon issue is new.
I think most of this revolves around loads not getting
this looks like the comment got cut off. :qdot, any more you remember about this, and esp. if the url spoof is covered somewhere else if the ssl spoof is now taken care of?
Comment 21•6 years ago
|
||
I think this is yet another load stall/cancellation issue similar to bug 1263100. URL spoof in particular looks like bug 1481994, which also looks like bug 1263100.
Comment 22•6 years ago
|
||
(In reply to :Gijs (limited availability until Tue 29; he/him) from comment #20)
I'd prefer to keep it together, though I wonder if we could write an automated testcase for the ssl spoof so we don't inadvertently break it again... Dana, looks like you "accidentally" fixed this by making the nsSecureBrowserImpl stuff much more sane. Interested in doing a testcase in a separate bug?
Sure - I can have a look. I filed bug 1522681 with a vague title/summary.
Updated•6 years ago
|
Updated•5 years ago
|
Comment 23•3 years ago
|
||
Paul, can you please test and confirm if the URL spoof is fixed now with the latest modal changes?
Comment 24•3 years ago
|
||
I've tested the PoCs in new-pocs.zip. The only spoofing issue I can reproduce is that the prompt is showing when the page content and urlbar already switched to google.com. Which is an improvement over the issue shown here https://www.youtube.com/watch?v=RhoSN9zIOiA where the content area still shows the localhost page when the urlbar has already updated.
Comment 25•3 years ago
|
||
Assignee | ||
Comment 26•3 years ago
|
||
(In reply to Paul Zühlcke [:pbz] from comment #24)
I've tested the PoCs in new-pocs.zip. The only spoofing issue I can reproduce is that the prompt is showing when the page content and urlbar already switched to google.com. Which is an improvement over the issue shown here https://www.youtube.com/watch?v=RhoSN9zIOiA where the content area still shows the localhost page when the urlbar has already updated.
Uh, why does the screenshot disagree about the origin of the dialog and the origin you're giving permission to keep prompting?!
Assignee | ||
Updated•3 years ago
|
Comment 27•3 years ago
|
||
(In reply to :Gijs (he/him) from comment #26)
(In reply to Paul Zühlcke [:pbz] from comment #24)
I've tested the PoCs in new-pocs.zip. The only spoofing issue I can reproduce is that the prompt is showing when the page content and urlbar already switched to google.com. Which is an improvement over the issue shown here https://www.youtube.com/watch?v=RhoSN9zIOiA where the content area still shows the localhost page when the urlbar has already updated.
Uh, why does the screenshot disagree about the origin of the dialog and the origin you're giving permission to keep prompting?!
That's odd....
I suspect that they somehow end up with two different principals. The principal which is used to create the checkbox label comes from here:
https://searchfox.org/mozilla-central/rev/9c9f2f85d00aef1943cb521ac95c72bae932ebc5/dom/base/nsGlobalWindowInner.cpp#3722
The principal used for the content prompt title comes from here: https://searchfox.org/mozilla-central/rev/9c9f2f85d00aef1943cb521ac95c72bae932ebc5/toolkit/components/prompts/src/Prompter.jsm#1196
Given the nature of this bug it seems plausible that the principals would be out of sync. I'm not sure why this.browsingContext.window?.document.nodePrincipal;
would lead to the "old" principal though. It makes sense that the checkbox label is correct, given that it directly comes from the SubjectPrincipal.
Anyway, we shouldn't show this prompt at all.
Comment 28•3 years ago
|
||
Is this still an issue? It looks like the related bug was closed about a month ago. Thanks.
Comment 29•3 years ago
|
||
Seems to be fixed! Can't reproduce the issue anymore with the PoC code in new-pocs.zip.
Updated•3 years ago
|
Updated•3 years ago
|
Updated•2 years ago
|
Updated•6 months ago
|
Description
•