blob: URI Spoofing Vulnerability Address Bar Display Issue
Categories
(Firefox for Android :: Toolbar, defect, P3)
Tracking
()
People
(Reporter: nandorejal, Assigned: michel)
References
()
Details
(Keywords: csectype-spoof, reporter-external, sec-low, Whiteboard: [fixed by 1969937][client-bounty-form][adv-main141+])
Attachments
(6 files)
Affected Version mozilla mobile browser : 128.0.1
Summary :
The issue involves URL spoofing vulnerabilities related to how browsers display URLs, particularly in the context of blob URLs and registrable domains. The problem is observed in Mozilla's handling of URLs when the address bar is narrow, and it concerns how the browser prioritizes displaying the registrable domain versus the URL prefix.
Scenario :
When a victim clicks a button that the attacker has exploited, and the attacker creates a subdomain like https://login.google.com.attacker-domain.com, the browser may show a blob URL prefix (e.g., blob:https://login.your-bank.com). This could create an opportunity for spoofing, making users believe that the content is served from a trusted domain (your-bank.com), when in reality it is served from a malicious domain.
Spoofing Potential:
The current URL display behavior of showing the registrable domain helps prevent spoofing by making it clear which domain is actually providing the content. If Mozilla displayed the full URL prefix instead, attackers could exploit this to create convincing phishing or fraudulent pages that appear to be from legitimate sources.
Reference Show URLs Standards :
Reproduce :
- Upload my exploit file on your domain
- Open the url
- Click the button
- Direct and spoofing
For details on how to reproduce this, please refer to the proof of concept video.
| Reporter | ||
Comment 1•1 year ago
|
||
This is a proof of how the Chrome mobile browser handles blob URLs in the address bar.
| Reporter | ||
Comment 2•1 year ago
|
||
This file is used for the exploit.
Updated•1 year ago
|
| Reporter | ||
Comment 4•1 year ago
|
||
Hallo sir, can i request this to unpublic? or you can hide for exploit.html?
Updated•1 year ago
|
Comment 5•1 year ago
|
||
Rifa'i, unfortunately I couldn't hide the attachment. I've set it to obsolete so it won't show on the page. thanks
Updated•1 year ago
|
Comment 6•1 year ago
|
||
It's possible fixing the basic issue for bug 1670725 will forget to also fix this for "blob:" URLs where the "display origin" is not syntactically an origin internally. Better to make this depend on the other because I bet it will require special handling.
Comment 7•1 year ago
|
||
I found this old Chromium issue which looks the same. Indeed, for their case they had to add special handling for blob URLs.
| Reporter | ||
Comment 8•1 year ago
|
||
If this is not a duplicate, I think making this report private would be a good idea because it can lead to a potential spoofing attack, as mentioned in reply comment #7. When I checked the eligible bounty page, it seems possible to get a reward. So why was my report flagged with sec-bounty-? Can you explain it? Also, is my report still eligible to receive CVEs?
| Reporter | ||
Comment 9•1 year ago
|
||
Can you make this report private? I have a new proof of concept method that can potentially lead to spoofing, similar to the issue on issues.chromium.org/issues/40052250
Comment 10•1 year ago
|
||
Setting this bug back to a private mobile security bug.
| Reporter | ||
Comment 11•1 year ago
|
||
So, now that it's private, I am ready to show a new proof of concept.
Requirements to Reproduce:
- Create a nested domain resembling a familiar website. Example: auth.mozilla.org.[attacker].com
- Exploit file [exploit.html] and a file for redirecting to the exploit file [redirect.html]
Steps to Reproduce:
- Create a subdomain that appears familiar when viewed in the address bar. Example: the attacker creates a subdomain like auth.mozilla.org.[attacker].com.
- Then, upload the exploit file [exploit.html] on main website [attacker.com] and create a file [redirect.html] which contains a button that redirects to auth.mozilla.org.[attacker].com/exploit.html.
- When the victim visits [attacker.com]/redirect.html and clicks the button, it will appear unsuspicious to the victim.
- The user inputs their credentials, and then the attacker gains access.
Regards,
Rifa'i Rejal Maynando
| Reporter | ||
Comment 12•1 year ago
|
||
Sorry, that is an incorrect step. The correct one is...
Steps to Reproduce:
- Create a subdomain that appears familiar when viewed in the address bar. Example: the attacker creates a subdomain like auth.mozilla.org.[attacker].com.
- Then, upload the exploit file [exploit.html] on the subdomain website auth.mozilla.org.[attacker.com] and upload a file [redirect.html] on the main website which contains a button that redirects to auth.mozilla.org.[attacker].com/exploit.html.
- When the victim visits [attacker.com]/redirect.html and clicks the button, it will appear unsuspicious to the victim.
- The user inputs their credentials, and then the attacker gains access to the victim's account.
Updated•1 year ago
|
Updated•1 year ago
|
Comment 13•1 year ago
|
||
I should have restored the sec-bounty request ('?') when we un-duped it. It still might be a dupe, but it's hard to tell since the other bug has not been fixed.
| Reporter | ||
Comment 14•1 year ago
|
||
Any update about my report?
Comment 15•9 months ago
|
||
This is a mass bug change for bug bounty purposes. GUID for this change to search/archive on: c29ab022-4839-4706-86ca-770ef07c519c
Comment 16•9 months ago
|
||
This is a mass bug change for bug bounty purposes. GUID for this change to
search/archive on: c29ab022-4839-4706-86ca-770ef07c519c
Updated•8 months ago
|
Comment 17•8 months ago
|
||
Seems like the work from bug 1812898 fixed this and bug 1670725 also.
Closing as FIXED.
Feel free to reopen if you disagree.
Updated•8 months ago
|
Updated•8 months ago
|
Updated•8 months ago
|
Updated•7 months ago
|
Updated•6 months ago
|
Comment 18•6 months ago
|
||
Seems like the work from bug 1812898 fixed this
Apparently untrue, because we ended up fixing it in bug 1969937
Updated•6 months ago
|
Updated•6 months ago
|
Updated•6 months ago
|
Updated•6 months ago
|
Updated•1 month ago
|
Description
•