Domain highlighting and alignment is disabled Firefox Focus
Categories
(Focus :: General, defect)
Tracking
(firefox141 verified)
Tracking | Status | |
---|---|---|
firefox141 | --- | verified |
People
(Reporter: alayersattackers, Assigned: michel)
References
(Blocks 1 open bug)
Details
(Keywords: csectype-spoof, reporter-external, sec-moderate, Whiteboard: [adv-main141+])
Attachments
(5 files)
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.0.0 Safari/537.36
Steps to reproduce:
Product:
Mozilla Firefox Focus
Version:
139.0 (Build #391432055) (as shown in the provided image, tested on 2025-05-23 build)
Vulnerability Type:
User Interface Security – URL Spoofing via Long Subdomain Truncation
Vulnerability Description:
Mozilla Firefox Focus for Android version 139.0 has a user interface vulnerability in how it displays URLs in the address bar when visiting sites with very long subdomains.
When the subdomain is excessively long, the browser address bar fails to show the main domain (eTLD+1) and instead displays only the beginning of the subdomain. For example:
https://long-extended-subdomain-name...
This causes the actual domain name (e.g., badssl.com) to be hidden from the user’s view, which is critical for verifying the true source of the website.
This behavior can be exploited by attackers to visually disguise the real domain, making it difficult for users to recognize the actual website they are visiting.
Steps to Reproduce:
- Install Mozilla Firefox Focus for Android (version 139.0, Build #391432055).
- Visit the following URL:
https://long-extended-subdomain-name-containing-many-letters-and-dashes.badssl.com/
- Observe the address bar.
- The browser only shows the initial part of the subdomain, and the main domain (badssl.com) is not visible.
- Users cannot easily identify the actual domain being accessed.
Potential Impact:
- Users may mistakenly trust a site based on a misleading address bar.
- Malicious actors can mask the real domain using long subdomains.
- This undermines user confidence in the browser’s ability to clearly convey website identity.
Severity:
High
This vulnerability affects a core security indicator in the browser’s user interface — the address bar. Since users rely on the displayed domain to verify site authenticity, hiding the main domain poses a significant security risk.
A similar issue was recognized by the Chromium team as P1 priority and S2 severity, with a $3,000 bounty, underscoring the importance of this issue:
Chromium reference:
https://issues.chromium.org/issues/395544225
Recommendation:
- Change the truncation logic to always preserve visibility of the main domain (eTLD+1).
- If truncation is necessary, shorten the beginning of the subdomain instead of the main domain.
- Consider providing an expanded or detailed view on tap/hover for mobile users when the full domain is truncated.
Actual results:
Actual Behavior:
Firefox Focus truncates the URL and only shows the beginning of the subdomain, hiding the main domain. This misrepresentation can mislead users about the website’s true origin.
Expected results:
Expected Behavior:
The browser should always display the main domain (eTLD+1) clearly and fully in the address bar, regardless of subdomain length. This helps users understand the actual website they are visiting.
Reporter | ||
Comment 1•5 months ago
|
||
screenshot poc
Updated•5 months ago
|
Updated•5 months ago
|
Assignee | ||
Comment 3•5 months ago
|
||
I don't believe that this is a duplicate of bug 1731181. The other one is much broader.
Assignee | ||
Updated•5 months ago
|
Updated•5 months ago
|
Assignee | ||
Updated•5 months ago
|
Assignee | ||
Comment 4•5 months ago
|
||
Assignee | ||
Updated•5 months ago
|
Comment 5•4 months ago
|
||
To me this also seems like a variant of bug 1731181 which is a duplicate of https://github.com/mozilla-mobile/fenix/issues/6762 that we didn't get to fix for Focus.
Assignee | ||
Comment 6•4 months ago
|
||
The revision was accepted, but the Testing Policy tag is missing. Is there anything that I need to do?
Comment 7•4 months ago
|
||
Think this can be landed but since Mihai approved the patch will defer to them for finishing the process.
Updated•4 months ago
|
Comment 9•4 months ago
|
||
bugherder |
Updated•4 months ago
|
Comment 10•4 months ago
|
||
Setting qe-verify+ given that https://phabricator.services.mozilla.com/D252491#8744829 stated it will require manual QA.
Updated•4 months ago
|
Assignee | ||
Updated•4 months ago
|
Comment 11•4 months ago
|
||
Verified as implemented on the latest Firefox Focus for Android Nightly 141.0a1 from 6/12 with a Google Pixel 6 (Android 15), and an Oppo Find N2 Flip (Android 15).
Updated•4 months ago
|
Comment 13•4 months ago
|
||
sec-low spoofing bugs are not eligible for the bug bounty.
Updated•3 months ago
|
Comment 14•3 months ago
|
||
Updated•3 months ago
|
Updated•3 months ago
|
Updated•9 days ago
|
Description
•