malicious webpage can filter keyboard strokes and specify a file for uploading from client

VERIFIED DUPLICATE of bug 56236

Status

()

defect
VERIFIED DUPLICATE of bug 56236
14 years ago
13 years ago

People

(Reporter: cmcauley, Unassigned)

Tracking

Trunk
x86
All
Points:
---

Firefox Tracking Flags

(Not tracked)

Details

()

Reporter

Description

14 years ago
User-Agent:       Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.6) Gecko/20050317 Firefox/1.0.2
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.6) Gecko/20050317 Firefox/1.0.2

In the page at www.lemure.net/~chuck/hiddenForm_moz.html you can see a sample
code that demonstrates this problem.  By filtering out keyboard events in a
specific order, it is possible to for a webpage to specify the file wanted for
upload.  By combining this with CSS, the upload dialog becomes invisible and the
user in unaware of the fact that they are entering a file.

If this is combined with a website related to technical discussion or similar
that has users entering a lot of / \ and : then it becomes somewhat trivial to
upload files.


Reproducible: Always

Steps to Reproduce:
In the problem url specified, enter text into the text box.  If a user types the
correct character, it will be captured and send focus to the file upload dialog.
 This allows a webpage to specifiy a file name, in this example, C:\boot.ini.

Actual Results:  
file upload

Expected Results:  
Prevent shifting focus to/from file upload widget.

*** This bug has been marked as a duplicate of 56326 ***
Group: security
Status: UNCONFIRMED → RESOLVED
Closed: 14 years ago
Resolution: --- → DUPLICATE
Dan: you've marked this as a dupe of the wrong bug.

Gerv
Status: RESOLVED → UNCONFIRMED
Resolution: DUPLICATE → ---
excuse the dyslexia

*** This bug has been marked as a duplicate of 56236 ***
Status: UNCONFIRMED → RESOLVED
Closed: 14 years ago14 years ago
Resolution: --- → DUPLICATE
Status: RESOLVED → VERIFIED

Comment 4

13 years ago
This case was assigned to CVE-2006-2894 after disclosed at full-disclosure list:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2894
You need to log in before you can comment on or make changes to this bug.