Closed Bug 1924826 Opened 1 year ago Closed 1 year ago

Possible download file from sandbox iframes

Categories

(GeckoView :: General, defect)

defect

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1791322

People

(Reporter: alisyarief.404, Unassigned)

Details

(Keywords: reporter-external, Whiteboard: [client-bounty-form])

Attachments

(7 files)

Attached video repro_android.mp4

VULNERABILITY DETAILS

Content-Disposition Header:
In the server.py script, the Content-Disposition header is set to attachment for the download.txt file. This header indicates to the browser that the file should be downloaded rather than displayed inline.

<iframe src="http://192.168.1.7:8899/iframe.html" sandbox="allow-scripts allow-popups allow-same-origin" style="height:300px;width:500px;"></iframe>

OS : Android 14
Firefox Nightly : Version 133.0a1 (Build #2016049767)

REPRODUCTION CASE

Im testing in different Origin

index.html : running in http://127.0.0.1:6622/
iframe.html, iframe.js, download.txt, sw.js, server.py : running in http://127.0.0.1:8899/

  1. Open index.html
  2. Click Click anywhere in this iframe to trigger the download in iframe
  3. Download Execute

Note :

  • This not work in Firefox Desktop, Chrome
  • This not work in Chrome and anything browser chromium in Android
Flags: sec-bounty?
Attached file index.html
Attached file iframe.html
Attached file iframe.js
Attached file sw.js
Attached file server.py
Attached file download.txt
Status: UNCONFIRMED → RESOLVED
Closed: 1 year ago
Component: Security → General
Duplicate of bug: CVE-2025-8042
Product: Firefox → GeckoView
Resolution: --- → DUPLICATE
Flags: sec-bounty? → sec-bounty-
Group: firefox-core-security
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: