Closed Bug 1872664 Opened 1 year ago Closed 8 months ago

Android Firefox Focus Permanent Full Screen Spoof when it's reloaded after opening Nightly and come back

Categories

(Focus :: General, defect, P2)

defect

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1892407

People

(Reporter: proof131072, Unassigned)

References

Details

(Keywords: csectype-spoof, reporter-external, sec-moderate, Whiteboard: [dupe of 1854417?][reporter-external] [client-bounty-form] [verif?])

Attachments

(4 files)

This is a relatively harder issue to explain, please understand that part first (we might need some lengthy discussion before reproducing and completely understand)

We are able to Full Screen Spoof Android Firefox Focus permanently even when you try to exit.

This happens when we load JavaScript dialog with 401 Auth prompt with full screen and then go to Nightly to trigger reloading behaviour on Focus that will lead to not exitable permanent spoof which is bad.

Please note that I initially found this issue on 118. (I really have to stop excusing myself from reporting bugs immediately that's a bit hard to explain, I know. I'm trying to overcome this and it's one of the main goals this year)

PoC demo: https://pwning.click/focusnoti.php

Flags: sec-bounty?

(Reproduced again today)

Duplicate of this bug: 1872663
Group: firefox-core-security → mobile-core-security
Component: Security → General
Product: Firefox → Focus
See Also: → 1854417

Ok so we are able to reproduce this with no user interaction just by using other apps for a while and coming back or let device sleep a little and coming back.

We can trigger this without JavaScript dialog and 401 Auth prompt.

Test it on https://pwning.click/focusnoti2.php

Being able to reload JavaScript dialogs with no origin inside full screen spoof when we trigger this seems to be different issue but I'm not sure if I need to open new report for that?

How is this different from bug 1854417? You never provided a testcase for that one, and without that this looks like a demonstration of that concept rather than a different issue.

Whiteboard: [reporter-external] [client-bounty-form] [verif?] → [dupe of 1854417?][reporter-external] [client-bounty-form] [verif?]

bug 1854417 is about Full Screen persisting after leaving focus while this is about "not exitable" with back button Full Screen spoof.

So PoC code would be same simple Full Screen trigger but reproduce steps is different since this is about Full Screen spoof getting stuck so we can't escape from it.

I just found the report on issue for Firefox which is same impact to this one: https://bugzilla.mozilla.org/show_bug.cgi?id=1719088

Severity: -- → S3
Priority: -- → P2

I'll clarify this again, repeatedly clicking / tapping on back button will NOT allow you to exit Full Screen, in fact there is no other way to exit from it as far as I can tell from my test.

bug 1854417 is persisting Full Screen after you left the Focus and come back which is immediately exitable after tapping on back button, while this stuck/jail you inside Full Screen Spoof with any spoofed content.

Flags: needinfo?(mtighe)

Ah, needinfo is done by mistake though, I apologise about that.

Flags: needinfo?(mtighe)

Any update here? is this issue understood or is there anything I can help?

as i understand it, i think this is a duplicate of an issue i fixed, but if not please explain the steps to reproduce a bit more clearly

Status: NEW → RESOLVED
Closed: 8 months ago
Duplicate of bug: CVE-2024-9391
Resolution: --- → DUPLICATE
Flags: sec-bounty? → sec-bounty-
Group: mobile-core-security
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: