Closed Bug 1843037 Opened 2 years ago Closed 1 year ago

Security bug Spoofing via filename download (firefox focus android)

Categories

(Focus :: General, defect, P2)

defect

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1843032

People

(Reporter: sas.kunz, Unassigned)

References

Details

(Keywords: csectype-spoof, reporter-external, sec-moderate, Whiteboard: [reporter-external] [client-bounty-form] [verif?])

Attachments

(2 files)

Attached video focus_downloadspoof.mp4

I found vulnerability via filename donwload using \n or \r . lead to spoof filename

step to produce:

1.open http://103.186.0.20/downloadspoof.html or downloadspoof.html
2. click "open" button
impact : victim can be spoofed will think that it is a document file and even though it is an apk file

Flags: sec-bounty?
Attached image spooffocus.jpg
Group: firefox-core-security → mobile-core-security
Component: Security → General
Product: Firefox → Focus
See Also: → 1843032

The way our Android products work I would guess this is in shared "Android Components" code and will end up being a duplicate of bug 1843032.

Depends on: 1843032

Yes, Irene recommends we fix this bug in GeckoView or Gecko in bug 1843032, so Fenix and Focus are both fixed. I'm leaving this bug open as a reminder to test Focus after fixing bug 1843032.

Severity: -- → S3
Priority: -- → P2

(In reply to Hafiizh from comment #0)

1.open http://103.186.0.20/downloadspoof.html or downloadspoof.html

Hafiizh's server never seems to be reachable for me from California. "downloadspoof.html" refers to attachment 9343474 [details] in bug 1843032, the Fenix version of this bug.

This did turn out to be shared code so this is definitely a dupe

Status: NEW → RESOLVED
Closed: 1 year ago
Duplicate of bug: 1843032
Resolution: --- → DUPLICATE
Flags: sec-bounty? → sec-bounty-
Group: mobile-core-security
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: