Closed
Bug 304480
Opened 20 years ago
Closed 20 years ago
Filtered user input can be used to steal local files
Categories
(Firefox :: General, defect)
Firefox
General
Tracking
()
People
(Reporter: mikx, Unassigned)
References
()
Details
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6
Stealing files using automated form upload is a really old idea. There are
various security checks to prevent this, but using redirection of user input we
can still steal arbitrary local files.
This is possible since the onkeydown event (unlike the onkeypress event) on a
file input field can be used to read the keyCode a user is going to enter. By
only allowing certain characters in a certain order (by returning false on
keyCodes we don't want) we can create arbitrary strings.
The longer the user given text, the better the chance we can create a good path
out of it. Beside the given proof-of-concept a perfect field for exploits would
be any kind of web based email, blogging or messaging system where users insert
a lot of text.
See the testcase source code for further details and some possible issues with
keyboard layouts (testcase will probably only work with english and german
keyboard layouts).
Reproducible: Always
Steps to Reproduce:
1. Open http://bugzilla:cZ3l9eS@www.mikx.de/firestealing/
2. Follow instructions
Comment 1•20 years ago
|
||
*** This bug has been marked as a duplicate of 56236 ***
Status: UNCONFIRMED → RESOLVED
Closed: 20 years ago
Resolution: --- → DUPLICATE
Updated•20 years ago
|
Group: security
Updated•20 years ago
|
Status: RESOLVED → VERIFIED
You need to log in
before you can comment on or make changes to this bug.
Description
•