Closed
Bug 438356
Opened 16 years ago
Closed 16 years ago
Passwords stored in plaintext file passwords.json
Categories
(Cloud Services :: General, defect, P1)
Cloud Services
General
Tracking
(Not tracked)
RESOLVED
FIXED
0.3
People
(Reporter: bugzilla, Unassigned)
References
Details
(Whiteboard: [sg:high])
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9) Gecko/2008052906 Firefox/3.0
Build Identifier: 0.1.30
I set up Weave to synchronize all my data, including my stored passwords.
I have just noticed a file called passwords.json present in my weave directory that contains all of my stored password data in plaintext. My stored passwords are stored encrypted with a master password and should never be exposed like this.
The file was still there even after I exited Firefox.
Reproducible: Always
Steps to Reproduce:
1. Set a master password for Firefox's password manager.
2. Save a password
3. Set Weave to synchronize stored passwords
4. Synchronize
Actual Results:
passwords.json file in weave profile directory contains all stored passwords in plaintext.
Expected Results:
Passwords are not stored in a plaintext file on disk.
Comment 1•16 years ago
|
||
we're going to pref passwords off by default for 0.2, but we should definitely deal with this in 0.3 as well as providing support for master passwords
Priority: -- → P1
Target Milestone: -- → 0.3
Updated•16 years ago
|
Status: UNCONFIRMED → NEW
Ever confirmed: true
Reporter | ||
Comment 2•16 years ago
|
||
I just installed 0.2.0, and stored password sync is not turned off by default.
Comment 3•16 years ago
|
||
It is off by default, but if you previously had it manually set on, that preference sticks.
That is, the setup wizard's checkboxes only reflect the current prefs, and the default value (fresh install, new profile) should be everything except passwords and forms on.
Comment 4•16 years ago
|
||
Just found out about it... A genuine WTF!? moment :p
There should be some kind of service announcement explicitly stating that all data is stored plain and accessible, because, quiet frankly, I wasn't expecting this at all, and I guess I'm not alone. After all the stuff that weave stores on a server is encrypted and that let me assume that any local stuff would be encrypted as well.
Made me think of the chrome-path-transversal bug again (bug #413250 / #413451). But now not only sessionstore.js would have been affected. :p
And please consider encrypting all data you store on hdd, not just passwords.
The idea of an attacker exploiting some similar future path-transversal bug in fx or some extension to read cookies.json isn't that great either.
Comment 5•16 years ago
|
||
These bugs need to be triaged, removing 0.3 milestone setting.
Target Milestone: 0.3 → Future
Comment 7•16 years ago
|
||
(Transferring [sg:high] status from duplicate-bug 440832)
Note that this bug isn't testable in currently-available Weave (e.g. ver 0.2.100), because password-syncing hasn't yet been implemented with Weave's new backend. I think that work is being tracked in bug 440832.
Whiteboard: [sg:high]
Updated•16 years ago
|
OS: Windows XP → All
Comment 8•16 years ago
|
||
I don't have access to bug 440832.
The password engine we're implementing for 0.3 does not require a snapshot at all, and so there will be no passwords.json on disk.
Updated•16 years ago
|
Comment 9•16 years ago
|
||
(In reply to comment #8)
> I don't have access to bug 440832.
I just un-hid that bug, so it should be accessible now. It's the same as this one.
> The password engine we're implementing for 0.3 does not require a snapshot at
> all, and so there will be no passwords.json on disk.
Awesome, so this should be fixed going forward.
However, is it possible that people who were affected by this bug in the past would still have a residual passwords.json file sitting in their profile directory? And if so, is there any way we can make updated Weave builds flush that out?
Comment 10•16 years ago
|
||
latest builds delete this file if it exists.
Status: NEW → RESOLVED
Closed: 16 years ago
Resolution: --- → FIXED
Updated•15 years ago
|
Component: Weave → General
Product: Mozilla Labs → Weave
Updated•15 years ago
|
QA Contact: weave → general
You need to log in
before you can comment on or make changes to this bug.
Description
•