Open Bug 1625391 Opened 4 years ago Updated 4 years ago

Login information for file: pages is stored globally for all of file:

Categories

(Toolkit :: Password Manager, defect, P3)

defect

Tracking

()

Tracking Status
firefox78 --- affected
firefox79 --- ?

People

(Reporter: a1406339013, Unassigned)

Details

(Whiteboard: [reporter-external] [client-bounty-form] [verif?])

Attachments

(1 file)

Attached file fox.html

Do you watch the video? Text doesn't describe the problem directly:

https://drive.google.com/open?id=12Oz9Pr9YM100Hki_cNOG1_GlJ8edsdXn

Flags: sec-bounty?

I don't understand what issue you're trying to describe. If you save a password for file://, then we will fill that login+password on the file:// page. Why is this surprising / a security problem?

Component: Security → about:logins
Flags: needinfo?(a1406339013)

If the user in the local opens an HTML page, and fill in the web page the user name and password and preserved, in the password manager will have a file:// website user name and password, the attacker to send another login page to victims, the victims in the local open the attacker's web page, file:// website user name and password before also leaked out

Flags: needinfo?(a1406339013)

(In reply to 梁国强 from comment #2)

If the user in the local opens an HTML page, and fill in the web page the user name and password and preserved, in the password manager will have a file:// website user name and password, the attacker to send another login page to victims, the victims in the local open the attacker's web page, file:// website user name and password before also leaked out

So this would only affect users who:

  1. use a file:/// login page
  2. save the password in the password manager
  3. would download an attacker's page
  4. then open the now-locally-stored attacker's page
  5. then somehow either reuse the credentials for the "real" local login page elsewhere, or otherwise expose the "real" local login page to the attacker (ie there is some other hole allowing the attacker to actually use the credentials for something).

Those are quite a lot of limitations. I especially haven't really seen people do (1) in the first place; if the file: page is validating the password locally, the password offers very little security in the first place... Unless the local tool is accurately using 2-way encryption (ie while you could validate a password with a hash function, that wouldn't add security unless the credentials themselves are actually used for encrypting local data).

I expect we should start saving passwords for the full file: origin, though that'll add friction for users, especially if we stop filling the credentials stored under file://. I'd sooner make a change like that in a public bug.

Type: task → defect
Component: about:logins → Password Manager
Product: Firefox → Toolkit
Summary: Local passwords stored in firefox can be stolen → Login information for file: pages is stored globally for all of file:

Can I get a reward?

Group: firefox-core-security
Status: UNCONFIRMED → NEW
Ever confirmed: true
Priority: -- → P3

Because this bug's Severity has not been changed from the default since it was filed, and it's Priority is P3 (Backlog,) indicating it has been triaged, the bug's Severity is being updated to S3 (normal.)

Severity: normal → S3

I think we may have unintentionally fixed this (any possibly caused regressions for this edge case). I suspect bug 1513003 is what would have done that.

Andrei, do you have a chance to confirm with mozregression when this was fixed? Watch the video for steps but essentially if you save a login form to your computer such and open it in Firefox (which is via a file:///… URI) then this bug doesn't want the captured logins shared with a different local file.

Flags: needinfo?(andrei.purice)
Has STR: --- → yes
Flags: needinfo?(andrei.purice)

This bug is not eligible for our security bug bounty. We don't consider this a security bug.

Flags: sec-bounty? → sec-bounty-
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: