Closed
Bug 190532
Opened 20 years ago
Closed 20 years ago
IRC may need port restriction to avoid SMTP exploit
Categories
(Other Applications :: ChatZilla, defect)
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: security-bugs, Assigned: rginda)
Details
Attachments
(1 file)
3.69 KB,
patch
|
darin.moz
:
review+
dbaron
:
approval1.3b+
|
Details | Diff | Splinter Review |
From Georgi: We may want to restrict the ports that IRC can use, since it might be possible to use a link like <a href="irc://localhost:25">IRC TO localhost:smtp</a> to send mail in another user's name, similar to a problem we once had with Gopher.
Assignee | ||
Comment 1•20 years ago
|
||
I don't see how it would be possible to send anything that looks like SMTP over irc:, but I could be wrong. http://lxr.mozilla.org/mozilla/source/extensions/irc/js/lib/chatzilla-service.js#171 It looks to me that chatzilla shouldn't allow connections over questionable ports, but I've never actually seen this function get called. Mitch, what's the deal with nsIProtocolHandler.allowPort? Is it only supposed to be called for questionable ports, or all ports? Any idea why it isn't being called for me?
Status: NEW → ASSIGNED
Comment 2•20 years ago
|
||
rob: you need to call nsIIOService::allowPort from your implementation of newChannel if you want to use the standard port blocking mechanism. nsIOService::AllowPort will invoke your nsIProtocolHandler::allowPort to give you the opportunity to override a port that the io service would otherwise block. see nsIIOService.idl and nsIProtocolHandler.idl for more details. this stuff is sort of documented there.
Comment 3•20 years ago
|
||
btw: this issue is not just with SMTP... we generally block other ports as well. the list is in nsIOService.cpp.
Assignee | ||
Comment 4•20 years ago
|
||
Patch uses allowPort as described by darin. I also took the opportunity to remove some of the aUseless aArgument aPrefixes that I hate so much in JavaScript.
Assignee | ||
Updated•20 years ago
|
Attachment #113511 -
Flags: review?(darin)
Attachment #113511 -
Flags: approval1.3b?
Comment 5•20 years ago
|
||
Comment on attachment 113511 [details] [diff] [review] patch r/sr=darin (looks good!) i really wish we had chosen different names for nsIIOService::allowPort and nsIProtocolHandler::allowPort, since the sense of the return value is inconsistent :-( the protocol handler one should have been called something like "overridePortBan" or something more to the point.
Attachment #113511 -
Flags: review?(darin) → review+
Updated•20 years ago
|
Attachment #113511 -
Flags: approval1.3b? → approval1.3b+
Assignee | ||
Comment 6•20 years ago
|
||
checked in.
Status: ASSIGNED → RESOLVED
Closed: 20 years ago
Resolution: --- → FIXED
Comment 7•19 years ago
|
||
Bugs published on the Known-vulnerabilities page long ago, removing confidential flag.
Group: security
Updated•19 years ago
|
Product: Core → Other Applications
You need to log in
before you can comment on or make changes to this bug.
Description
•