Closed Bug 529594 (CVE-2009-4129) Opened 16 years ago Closed 13 years ago

Mozilla Firefox local file Popup Message Spoofing Vulnerability (TSA-20091117-006)

Categories

(Core :: DOM: Core & HTML, defect)

defect
Not set
major

Tracking

()

RESOLVED WORKSFORME
Tracking Status
blocking2.0 --- -

People

(Reporter: reed, Unassigned)

References

Details

(Keywords: sec-low, testcase, Whiteboard: [sg:low spoof])

Received the following advisory today at security@. Not really sure what component it would fall under, so filing it under Core :: General for now. ========================================================================== +------------------------------------------------------------------------+ | TOPSEC SECURITY RESEARCH LAB November 17, 2009 | | http://www.topsec.com.cn TSA-20091117-006 | | | | Product: Firefox | | Summary: Popup message spoofing. | +------------------------------------------------------------------------+ BACKGROUND ---------- Firefox is Mozilla Foundation's open source web browser application. More information is available at the following website: http://www.mozilla.com/firefox/ OVERVIEW -------- Firefox v3.5.5 is prone to popup message spoofing contained inside a web page on another domain. Popup message spoofing can be done by a mismatch of URL in the browser address bar and the true origin of popup message . A real exploitation of this issue is in the following scenario: When a user opens the malicious web page using Firefox v3.5.5 will see address(example: digg.com) but when popup message is displayed, the displayed popup message could be from another domain, not the address shown(digg.com). An attacker can use this vulnerability in order to hide his address and perform social engineering attacks to perform a successful Internet user targeting attack. WORKAROUND ---------- Although it is not widely viewed as a viable workaround, disabling scripting can prevent exploitation of this vulnerability. The following steps explains how to disable this setting on Firefox 3. 1. From the "Tools" menu, select "Options" 2. Navigate to the "Content" settings. 3. Ensure that "Enable JavaScript" is not checked.
Hmm, I'm not seeing "[JavaScript Application]" as my window title. I see "The page at https://bug529594.bugzilla.mozilla.org says..." Maybe I need to run these locally? I'll test that.
Keywords: testcase
Indeed. If I run the testcase locally (and have it point to a local file), I get "[JavaScript Application]" as the window title.
Whiteboard: spoof
No difference between absolute or relative URL. I seem to only be able to get "[JavaScript Application]" when the files are local to my machine. I have one more thing to test just to make sure the attachment redirect isn't causing problems.
Nope, still getting a title that says "The page at <url> says:" even when accessing the files without some type of redirect.
This is not exploitable from the web where we clearly show the host name that originated the prompt. We don't for local files -- for prompts from a hostless source we use the old generic script title. At the time we weren't all that worried about downloaded malicious files, but it wouldn't be hard to change the title to say it's a local source. Even then there's spoofing risk because people read the dialogs and not the titles, but you can only do so much. Leaving this open in case we want to change prompt titles for hostless sources, but it doesn't need to be a hidden security bug.
Group: core-security
Summary: Mozilla Firefox Popup Message Spoofing Vulnerability (TSA-20091117-006) → Mozilla Firefox local file Popup Message Spoofing Vulnerability (TSA-20091117-006)
I disagree with comment 10. I think it's a bug that the evil page can make a popup appear directly above a page from another domain, and I don't think the "host X says:" really saves us. If we want to change prompt titles for hostless sources, that should be a separate bug.
Whiteboard: spoof → [sg:low] spoof
Where is it coming up from a different domain? In the examples here it's all the same domain and that doesn't seem to be the trick they're trying to pull. Are you saying that a cross-origin frame/plugin should not be allowed to use alert/prompt/confirm ever? That's maybe worth persuing (though it will have some collateral damage), but I didn't think that's what this bug is about.
Ah, the joys of a high latency connection. I dismissed the prompt over a blank page (with the URL bar still saying bugzilla) before any digg content came up.
Group: core-security
So what you really want is that the prompt service should fail if the page is already navigating, or the modal dialog should suspend/cancel the navigation.
I'm with Jesse. Window title is a mitigation, but address bar is primary, for determining URL.
Alias: CVE-2009-4129
Whiteboard: [sg:low] spoof → [sg:low spoof]
blocking2.0: --- → ?
blocking2.0: ? → -
Component: General → DOM
QA Contact: general → general
Given that we have now tab specific prompt/alert/etc, this should be WFM. Can't reproduce the problem. Marking WFM, please reopen if you see still some issue.
Status: NEW → RESOLVED
Closed: 13 years ago
Resolution: --- → WORKSFORME
Group: core-security
Component: DOM → DOM: Core & HTML
You need to log in before you can comment on or make changes to this bug.