Closed Bug 1740016 Opened 3 years ago Closed 3 years ago

bypass Uxss on Firefox android via javascript:alert(1)// which is shared via the Google translate app[Bug]:

Categories

(Fenix :: General, defect)

Unspecified
Android
defect

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1739934

People

(Reporter: amejia, Unassigned)

Details

From github: https://github.com/mozilla-mobile/fenix/issues/22356.

Steps to reproduce

hello Firefox security team,
i think it's a uxss vulnerability triggering android Firefox users, when i try to execute javascript:alert(1) in Firefox it doesn't work. to trigger it I use the Google translate app and translate javascript:alert(document.domain)// then I share it with Firefox users then uxss will be triggered there.

Production steps:

  1. enter the android app and translate javascript:alert(1) // then share it to Firefox android
  2. successfully shared Firefox will point to google, with a javascript:alert(1) search
  3. just press once search on Firefox web then enter then uxss will be triggered.

scenario :
I think not everyone understands this problem, maybe when the javascript that is shared from the translate apps to Firefox users, ordinary victims will use the search feature of Firefox and accidentally press enter because there is no back button. with this xss will be triggered

PoC videos :
https://drive.google.com/file/d/1dEXjgypdjKb_eZNIW3Pf7WIY5Cjkmqq7/view?usp=sharing

Impact :
Uxss via javascript shared by translate apps to Firefox android users

Expected behaviour

Uxss

Actual behaviour

Uxss

Device name

Oppo

Android version

Android 11

Firefox release type

Firefox

Firefox version

89

Device logs

No

Additional information

Uxss

Change performed by the Move to Bugzilla add-on.

Group: mobile-core-security
Status: NEW → RESOLVED
Closed: 3 years ago
Resolution: --- → DUPLICATE
Component: Security: Android → General
Group: mobile-core-security
You need to log in before you can comment on or make changes to this bug.