Closed
Bug 505988
(CVE-2009-3374)
Opened 16 years ago
Closed 16 years ago
It's possible to access a double-wrapped object's underlying privileged object
Categories
(Core :: XPConnect, defect, P1)
Tracking
()
RESOLVED
FIXED
Tracking | Status | |
---|---|---|
status1.9.2 | --- | beta1-fixed |
blocking1.9.1 | --- | .4+ |
status1.9.1 | --- | .4-fixed |
People
(Reporter: moz_bug_r_a4, Assigned: mrbkap)
References
Details
(Keywords: verified1.9.0.15, verified1.9.1, Whiteboard: [sg:critical])
Attachments
(1 file, 1 obsolete file)
9.11 KB,
patch
|
bzbarsky
:
review+
jst
:
superreview+
dveditz
:
approval1.9.1.4+
dveditz
:
approval1.9.0.15+
|
Details | Diff | Splinter Review |
XPCVariant::VariantDataToJS() unwraps double-wrapped objects even when it
shouldn't.
Reporter | ||
Comment 1•16 years ago
|
||
Updated•16 years ago
|
Component: Security → XPConnect
QA Contact: toolkit → xpconnect
Whiteboard: [sg:crit]
Updated•16 years ago
|
blocking1.9.1: --- → ?
Flags: blocking1.9.2+
Priority: -- → P1
Updated•16 years ago
|
Whiteboard: [sg:crit] → [sg:critical]
Comment 2•16 years ago
|
||
Do we need this on 1.9.0? This definitely block 1.9.1.x but not sure if it's for .2 or .3.
Comment 3•16 years ago
|
||
Yes, this affects Firefox 3.0.x
Assignee: nobody → mrbkap
Flags: wanted1.9.0.x? → wanted1.9.0.x+
Updated•16 years ago
|
blocking1.9.1: needed → .3+
Flags: blocking1.9.0.13?
Assignee | ||
Comment 4•16 years ago
|
||
This patch fixes this bug, but I'm seeing spurious errors in the livemark service with it applied.
Assignee | ||
Comment 5•16 years ago
|
||
The spurious errors were due to my incorrectly backing out bug 384632.
Attachment #390374 -
Attachment is obsolete: true
Attachment #390563 -
Flags: superreview?(jst)
Attachment #390563 -
Flags: review?(bzbarsky)
Comment 6•16 years ago
|
||
The blocking1.9.0.13+ is a soft block, we'll take it on the 1.9.0 branch when it gets fixed on the 1.9.1 branch.
Flags: blocking1.9.0.13? → blocking1.9.0.13+
![]() |
||
Comment 7•16 years ago
|
||
Comment on attachment 390563 [details] [diff] [review]
Proposed fix
Seems ok.
Attachment #390563 -
Flags: review?(bzbarsky) → review+
Updated•16 years ago
|
Attachment #390563 -
Flags: superreview?(jst) → superreview+
Assignee | ||
Updated•16 years ago
|
Keywords: checkin-needed
Flags: in-testsuite+
![]() |
||
Comment 9•16 years ago
|
||
This caused a bunch of password manager test failures along these lines:
/test/test_basic_form_observer_autofillForms.html | Checking foundLogins is array - got "Object", expected "Array"
82398 ERROR TEST-UNEXPECTED-FAIL | /tests/toolkit/components/passwordmgr
82407 ERROR TEST-UNEXPECTED-FAIL | /tests/toolkit/components/passwordmgr/test/test_basic_form_observer_foundLogins.html | Checking foundLogins is array - got "Object", expected "Array"
and various other stuff, but I suspect most of it is due to the tests that got the errors above failing and due to the fact that the tests in this dir all depend on each other(!). Which means you have to run with
--test-path=toolkit/components/passwordmgr/test/
to test reasonably; just running a single test won't work. And if you run a single test and then the whole dir that will also fail...
It's not clear to me whether this is a problem in the test or in the patch yet, but for now backed out to get the tree green: http://hg.mozilla.org/mozilla-central/rev/c1ab8650e0ce
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
Comment 10•16 years ago
|
||
This is a P1 1.9.2 blocker, thus blocking Firefox 3.6a1 - any ETA on re-landing or analysing why this caused so many test failures?
Comment 11•16 years ago
|
||
Justin: can you take a second to see if you can figure out why the PW Mgr tests failed?
Comment 12•16 years ago
|
||
So, this was a test added for bug 492153. That bug added notifications for when pwmgr does things when processing a form. The notification's subject is a nsIPropertyBag, with various properties set. One of these is a JS array of relevant logins.
The notification is built in nsLoginManager.js's _notifyFoundLogins() as
propbag.setPropertyAsInterface("foundLogins", foundLogins.concat());
And the test is checking
propbag.get("foundLogins").constructor.name, "Array", "Checking foundLogins is array");
I'd guess that either something is going wrong in setting the property (I think there's some XPCOM magic being used to shove an Array into an nsISupports param), or that checking .constructor.name isn't a reliable thing to do. [ISTR Firebug having run into similar problems.]
mrbkap, does this help?
Comment 13•16 years ago
|
||
I need to know if this needs to land for alpha 1 in order to make 1.9.2; it's literally holding our alpha production and branch at this point.
Please respond ASAP.
Assignee | ||
Comment 14•16 years ago
|
||
(In reply to comment #13)
> I need to know if this needs to land for alpha 1 in order to make 1.9.2; it's
> literally holding our alpha production and branch at this point.
>
> Please respond ASAP.
Sorry, I should have commented here... The reason for the MochiTest failures are now blocking this bug. Once those bugs land, this one should be able to as well.
Comment 15•16 years ago
|
||
This probably needs to wait for the next round of releases rather than trying to rush this into 1.9.1.3/1.9.0.14
blocking1.9.1: .3+ → .4+
Flags: blocking1.9.0.14+ → blocking1.9.0.15+
Assignee | ||
Comment 16•16 years ago
|
||
Assignee | ||
Updated•16 years ago
|
Status: REOPENED → RESOLVED
Closed: 16 years ago → 16 years ago
Resolution: --- → FIXED
Comment 17•16 years ago
|
||
Mass change: adding fixed1.9.2 keyword
(This bug was identified as a mozilla1.9.2 blocker which was fixed before the mozilla-1.9.2 repository was branched (August 13th, 2009) as per this query: http://is.gd/2ydcb - if this bug is not actually fixed on mozilla1.9.2, please remove the keyword. Apologies for the bugspam)
Keywords: fixed1.9.2
Updated•15 years ago
|
status1.9.2:
--- → beta1-fixed
Keywords: fixed1.9.2
Comment 18•15 years ago
|
||
This is blocking 1.9.1.4 and 1.9.0.15 (code freeze Sept 22!). We probably need a branch patch that includes any regression fixes, or we need branch approval requests on those bugs too.
Whiteboard: [sg:critical] → [sg:critical][needs branch patch]
Assignee | ||
Updated•15 years ago
|
Attachment #390563 -
Flags: approval1.9.1.4?
Attachment #390563 -
Flags: approval1.9.0.15?
Comment 19•15 years ago
|
||
Comment on attachment 390563 [details] [diff] [review]
Proposed fix
Approved for 1.9.1.4 and 1.9.0.15, a=dveditz
Attachment #390563 -
Flags: approval1.9.1.4?
Attachment #390563 -
Flags: approval1.9.1.4+
Attachment #390563 -
Flags: approval1.9.0.15?
Attachment #390563 -
Flags: approval1.9.0.15+
Assignee | ||
Comment 20•15 years ago
|
||
http://hg.mozilla.org/releases/mozilla-1.9.1/rev/ed60afa878e9
Checking in js/src/xpconnect/src/xpcprivate.h;
/cvsroot/mozilla/js/src/xpconnect/src/xpcprivate.h,v <-- xpcprivate.h
new revision: 1.286; previous revision: 1.285
done
Checking in js/src/xpconnect/src/xpcvariant.cpp;
/cvsroot/mozilla/js/src/xpconnect/src/xpcvariant.cpp,v <-- xpcvariant.cpp
new revision: 1.32; previous revision: 1.31
done
Checking in js/src/xpconnect/tests/mochitest/Makefile.in;
/cvsroot/mozilla/js/src/xpconnect/tests/mochitest/Makefile.in,v <-- Makefile.in
new revision: 1.12; previous revision: 1.11
done
RCS file: /cvsroot/mozilla/js/src/xpconnect/tests/mochitest/test_bug384632.html,v
done
Checking in js/src/xpconnect/tests/mochitest/test_bug384632.html;
/cvsroot/mozilla/js/src/xpconnect/tests/mochitest/test_bug384632.html,v <-- test_bug384632.html
initial revision: 1.1
done
Keywords: fixed1.9.0.15
Assignee | ||
Updated•15 years ago
|
Whiteboard: [sg:critical][needs branch patch] → [sg:critical]
Comment 21•15 years ago
|
||
Verified fixed for 1.9.0.15 with Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.15pre) Gecko/2009092805 GranParadiso/3.0.15pre (.NET CLR 3.5.30729).
Verified fixed for 1.9.1 with Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.4pre) Gecko/20090924 Shiretoko/3.5.4pre (.NET CLR 3.5.30729).
Updated•15 years ago
|
Alias: CVE-2009-3374
Comment 22•15 years ago
|
||
This testcase doesn't run on the 1.8 branch because I get NS_ERROR_NOT_IMPLEMENTED from the document.setUserData() call. Is there some way to get the double unwrapping to happen on that branch? Or should we just not bother because that branch is missing so many wrappers anyway?
Reporter | ||
Comment 23•15 years ago
|
||
It seems that this bug is a regression from bug 384632 and that bug is not
fixed on the 1.8 branch and thus the 1.8 branch is not affected by this bug.
Reporter | ||
Comment 24•15 years ago
|
||
This testcase uses XSLTProcessor.setParameter(). This testcase works on
fx-3.5.3/fx-3.0.14 and is fixed on fx-3.5.4/fx-3.0.15. On SeaMonkey-1.1.18,
the same behavior as fx-3.5.4/fx-3.0.15.
Updated•15 years ago
|
Group: core-security
Flags: wanted1.8.1.x-
You need to log in
before you can comment on or make changes to this bug.
Description
•