Closed Bug 253215 Opened 21 years ago Closed 21 years ago

Mozilla Firefox Certificate Spoofing

Categories

(Core :: Security, defect)

x86
Windows 2000
defect
Not set
critical

Tracking

()

RESOLVED DUPLICATE of bug 253121

People

(Reporter: MMx, Assigned: dveditz)

References

()

Details

(Whiteboard: [sg:dupe 253121])

I don't know if it has been reported here already, the poster to bugtraq didn't say so. So I just c&p the bugtraq message here, although people might know already. ######################################### Application: Mozilla Firefox Vendors: http://www.mozilla.com Version: 0.9.1 / 0.9.2 Platforms: Windows Bug: Certificate Spoofing (Phishing) Risk: High Exploitation: Remote with browser Date: 25 July 2004 Author: Emmanouel Kellinis e-mail: me@cipher(dot)org(dot)uk web: http://www.cipher.org.uk List : BugTraq(SecurityFocus)/ Full-Disclosure ######################################### ======= Product ======= A popular Web browser,good alternative of IE and "The web browser" for linux machines, used to view pages on the World Wide Web. === Bug === Firefox has caching problem, as a result of that someone can spoof a certificate of any website and use it as his/her own. The problem is exploited using onunload inside < body> and redirection using Http-equiv Refresh metatag,document.write() and document.close() First you direct the redirection metatag to the website of which you want to spoof the certificate, then inside the < body> tag you add onulnoad script so you can control the output inside the webpage with the spoofed certificate. After that you say to firefox, as soon as you unload this page close the stream, aparently the stream you close is the redirection website, you do that with document.close(). Now you can write anything you want , you do that using document.write(). After writing the content of you choice you close the stream again , usually firefox wont display your content, although if you check the source code you see it , so the last thing is to refresh the new page (do that using window.location.reload()), after that you have your domain name in the url field , your content in the browser and the magic yellow Lock on the bottom left corner, if you pass your mouse over it you will see displayed the name of the website you spoofed the certificate, if you double click on it you will check full information of the certificate without any warning ! You dont need to have SSL in your website ! it will work with http. Additional using this bug malicious websites can bypass content filtering using SSL properties. ===================== Proof Of Concept Code ===================== < HTML> < HEAD> < TITLE>Spoofer< /TITLE> < META HTTP-EQUIV="REFRESH" CONTENT="0;URL=https://www.example.com"> < /HEAD> < BODY onunload=" document.close(); document.writeln('< body onload=document.close();break;> < h3>It is Great to Use example's Cert!'); document.close(); window.location.reload(); "> < /body> ========================================================= *PK:http://www.cipher.org.uk/files/pgp/cipherorguk.public.key.txt =========================================================
duping bug, did not expect to find through the query it because its a security issue. Sorry for the bugspam. *** This bug has been marked as a duplicate of 253121 ***
Status: UNCONFIRMED → RESOLVED
Closed: 21 years ago
Resolution: --- → DUPLICATE
Group: security
Whiteboard: [sg:dupe 253121]
You need to log in before you can comment on or make changes to this bug.