The default bug view has changed. See this FAQ.

IRC may need port restriction to avoid SMTP exploit

RESOLVED FIXED

Status

Other Applications
ChatZilla
RESOLVED FIXED
14 years ago
13 years ago

People

(Reporter: Mitchell Stoltz (not reading bugmail), Assigned: Robert Ginda)

Tracking

Trunk
x86
Windows 2000

Firefox Tracking Flags

(Not tracked)

Details

Attachments

(1 attachment)

From Georgi:
   We may want to restrict the ports that IRC can use, since it might be
possible to use a link like
<a href="irc://localhost:25">IRC TO localhost:smtp</a>
to send mail in another user's name, similar to a problem we once had with Gopher.
(Assignee)

Comment 1

14 years ago
I don't see how it would be possible to send anything that looks like SMTP over
irc:, but I could be wrong.

http://lxr.mozilla.org/mozilla/source/extensions/irc/js/lib/chatzilla-service.js#171

It looks to me that chatzilla shouldn't allow connections over questionable
ports, but I've never actually seen this function get called.  Mitch, what's the
deal with nsIProtocolHandler.allowPort?  Is it only supposed to be called for
questionable ports, or all ports?  Any idea why it isn't being called for me?
Status: NEW → ASSIGNED

Comment 2

14 years ago
rob: you need to call nsIIOService::allowPort from your implementation of
newChannel if you want to use the standard port blocking mechanism. 
nsIOService::AllowPort will invoke your nsIProtocolHandler::allowPort to give
you the opportunity to override a port that the io service would otherwise
block.  see nsIIOService.idl and nsIProtocolHandler.idl for more details.  this
stuff is sort of documented there.

Comment 3

14 years ago
btw: this issue is not just with SMTP... we generally block other ports as well.
 the list is in nsIOService.cpp.
(Assignee)

Comment 4

14 years ago
Created attachment 113511 [details] [diff] [review]
patch

Patch uses allowPort as described by darin.  I also took the opportunity to
remove some of the aUseless aArgument aPrefixes that I hate so much in
JavaScript.
(Assignee)

Updated

14 years ago
Attachment #113511 - Flags: review?(darin)
Attachment #113511 - Flags: approval1.3b?

Comment 5

14 years ago
Comment on attachment 113511 [details] [diff] [review]
patch

r/sr=darin (looks good!)

i really wish we had chosen different names for nsIIOService::allowPort and
nsIProtocolHandler::allowPort, since the sense of the return value is
inconsistent :-(

the protocol handler one should have been called something like
"overridePortBan" or something more to the point.
Attachment #113511 - Flags: review?(darin) → review+
Attachment #113511 - Flags: approval1.3b? → approval1.3b+
(Assignee)

Comment 6

14 years ago
checked in.
Status: ASSIGNED → RESOLVED
Last Resolved: 14 years ago
Resolution: --- → FIXED
Bugs published on the Known-vulnerabilities page long ago, removing confidential
flag.
Group: security
Product: Core → Other Applications
You need to log in before you can comment on or make changes to this bug.