Closed
Bug 159484
Opened 23 years ago
Closed 23 years ago
javascript urls can steal password data
Categories
(SeaMonkey :: Passwords & Permissions, defect)
SeaMonkey
Passwords & Permissions
Tracking
(Not tracked)
VERIFIED
FIXED
mozilla1.0.1
People
(Reporter: dveditz, Assigned: morse)
References
Details
(Whiteboard: [adt1 rtm] [ETA 07/30])
Attachments
(5 files, 1 obsolete file)
870 bytes,
text/html
|
Details | |
787 bytes,
text/html
|
Details | |
1.21 KB,
patch
|
Details | Diff | Splinter Review | |
2.28 KB,
patch
|
morse
:
review+
morse
:
superreview+
morse
:
approval+
|
Details | Diff | Splinter Review |
1.25 KB,
patch
|
Details | Diff | Splinter Review |
Password manager makes the same kind of host comparing mistake as in bug 152725,
thus javascript urls can steal password data.
Reporter | ||
Updated•23 years ago
|
QA Contact: tpreston → bsharma
Reporter | ||
Comment 1•23 years ago
|
||
This isn't a full exploit, but if you have password manager stores your
bugzilla password then clicking on the link will load that data into a form.
Reporter | ||
Comment 2•23 years ago
|
||
Reporter | ||
Comment 3•23 years ago
|
||
This is definitely a stop-ship.
Talon doesn't support Password Manager, does it?
Keywords: nsbeta1+
Whiteboard: [adt1 rtm]
Updated•23 years ago
|
Assignee | ||
Updated•23 years ago
|
Whiteboard: [adt1 rtm] [ETA Needed] → [adt1 rtm] [ETA 7-29]
Assignee | ||
Comment 4•23 years ago
|
||
Reporter | ||
Comment 5•23 years ago
|
||
Should we worry about SINGSIGN_RememberSignonData? Is there a way someone could
*save* a password for another host? If so how bad would that be?
Assignee | ||
Comment 6•23 years ago
|
||
I had thought about that but couldn't see any problem. What would an attacker
gain by having you log on as him -- he could simply do that himself. Also,
before a password is saved, the user must respond affirmatively to a pop-up
alert, so this can't happen without his knowledge.
Status: NEW → ASSIGNED
Comment 7•23 years ago
|
||
Comment on attachment 93053 [details] [diff] [review]
check to see if scheme supports hostnames
Hmm, this patch looks oddly familiar. r=mstoltz.
Attachment #93053 -
Flags: review+
Comment 8•23 years ago
|
||
Comment 9•23 years ago
|
||
Comment on attachment 93053 [details] [diff] [review]
check to see if scheme supports hostnames
a=chofmann for branch and trunk
Attachment #93053 -
Flags: approval+
Updated•23 years ago
|
Keywords: mozilla1.0.1
Reporter | ||
Comment 10•23 years ago
|
||
Comment on attachment 93053 [details] [diff] [review]
check to see if scheme supports hostnames
I can't think of a specific exploit against RememberSignonData, but it's clear
that the end result is known bad data getting into the password file if the
user clicks the wrong button (or another exploit suppresses the dialog?). I
don't know what an attacker could do with it if he succeeded, either, but bogus
data in such a sensitive spot sets off all my paranoia bells.
sr=dveditz if you file a bug on the RememberSignonData spot, or a bug to
convert wallet uses of nsIIOService to nsIURI. This patch is a stopgap anyway,
you're verifying that the nsIURI returns a host, but the host you actually do
use is gotten from a different method and may not in fact match.
Attachment #93053 -
Flags: superreview+
Assignee | ||
Comment 11•23 years ago
|
||
OK, I agree. Better safe than sorry. So I'll add the RememberSignonData patch
here as well.
Assignee | ||
Comment 12•23 years ago
|
||
Attachment #93053 -
Attachment is obsolete: true
Assignee | ||
Updated•23 years ago
|
Attachment #93158 -
Flags: superreview+
Attachment #93158 -
Flags: review+
Attachment #93158 -
Flags: approval+
Assignee | ||
Comment 13•23 years ago
|
||
Comment on attachment 93158 [details] [diff] [review]
check in two places
bringing reviews forward:
r=mstoltz
sr=dveditz
a=chofmann
Assignee | ||
Comment 14•23 years ago
|
||
Landed on trunk.
Status: ASSIGNED → RESOLVED
Closed: 23 years ago
Resolution: --- → FIXED
Comment 15•23 years ago
|
||
bsharma: can you pls verify this one on the trunk tomorrow? thanks!
Comment 16•23 years ago
|
||
Comment 17•23 years ago
|
||
Verified on 2002-07-30-trunk on Win 2000.
Steps:
1. Saved the bugzilla password in the Password Manager.
2. Ran the attached test case.
3. An exception is thrown in the JS console.
4. Ran the form test case.
5. An exception is thrown in the JS console.
Status: RESOLVED → VERIFIED
Comment 18•23 years ago
|
||
adt1.0.1+ (on ADT's behalf) approval for checkin to the 1.0 branch, pending
drivers ' approval. pls check this in asap, then replace the "mozilla1.0.1+"
with "fixed1.0.1". thanks!
Comment 20•23 years ago
|
||
a=chofmann for 1.0.1
Updated•22 years ago
|
Group: security?
Updated•22 years ago
|
Group: security?
Updated•22 years ago
|
Group: security
Updated•20 years ago
|
Product: Browser → Seamonkey
You need to log in
before you can comment on or make changes to this bug.
Description
•