Closed
Bug 1808119
Opened 2 years ago
Closed 2 years ago
Firefox Browser Spoofing URL to Download File
Categories
(Toolkit :: Downloads API, defect)
Toolkit
Downloads API
Tracking
()
RESOLVED
DUPLICATE
of bug 741050
People
(Reporter: alisyarief.404, Unassigned)
Details
(Keywords: reporter-external, Whiteboard: [reporter-external] [client-bounty-form] [verif?])
Attachments
(2 files)
This code when clicked, will open a new tab to the website "https://gmail.com" and will also trigger a download of the file located at "http://URL/Data_From_Gmail.pdf".
Repro Steps
macOS Mojave : 10.14.6 (18G9323)
Firefox Version : 108.0.1 (64-bit)
Impact :
Victim will believe file download is from gmail
Remediation :
Show download sources URL origin in prompt
This vulnerability like issue CVE-2021-21133 but this new methode and execute
And After research this script not execute in Modern Android Browser
Flags: sec-bounty?
Updated•2 years ago
|
Component: Security → Downloads API
Product: Firefox → Toolkit
Updated•2 years ago
|
Group: firefox-core-security
Status: UNCONFIRMED → RESOLVED
Closed: 2 years ago
Duplicate of bug: 741050
Resolution: --- → DUPLICATE
Updated•2 years ago
|
Flags: sec-bounty? → sec-bounty-
Updated•6 months ago
|
Keywords: reporter-external
You need to log in
before you can comment on or make changes to this bug.
Description
•