Closed
Bug 691014
Opened 13 years ago
Closed 13 years ago
Firefox 3.6.X : Navigation away from a page with multiple active <select> dropdown menu can be used for Spoofing And ClickJacking with Java applet
Categories
(Core :: DOM: Core & HTML, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 575294
Tracking | Status | |
---|---|---|
firefox7 | - | unaffected |
firefox8 | - | unaffected |
firefox9 | - | unaffected |
firefox10 | - | unaffected |
firefox11 | --- | unaffected |
firefox12 | --- | unaffected |
firefox13 | --- | unaffected |
firefox14 | --- | unaffected |
blocking1.9.2 | --- | needed |
status1.9.2 | --- | wanted |
People
(Reporter: jordi.chancel, Unassigned)
References
Details
(Keywords: reporter-external, Whiteboard: [sg:critical] (reqs Java) keep hidden while bug 575294 is)
Attachments
(1 file)
153.68 KB,
image/png
|
Details |
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:6.0.2) Gecko/20100101 Firefox/6.0.2
Build ID: 20110902133214
Steps to reproduce:
Like bug 575294 , Firefox shows the dropdown menu for <select> elements as an always-on-top chromeless window. It also allows arbitrary HTML content to be rendered in the <option> elements within the <select>.
This bug demonstrates than an attacker can cover a Java applet for evil.
I think this issue is critical.
Actual results:
A Java applet is spoofed by a clickjacking attack, using <select> elements with XUL.
Reporter | ||
Updated•13 years ago
|
Reporter | ||
Comment 1•13 years ago
|
||
This testcase works with 1680 x 945 screen but an universal solution is possible.
Reporter | ||
Comment 2•13 years ago
|
||
Comment 3•13 years ago
|
||
Is the XUL necessary? Since we block remote XUL by default, an exploit that requires remote XUL is probably WONTFIX, but it doesn't look like this actually requires XUL to achieve the effect...
Is this really any different than bug 575294?
Reporter | ||
Comment 4•13 years ago
|
||
no really different than bug 575294 but Jesse Ruderman want a new report for this issue with Java.
Reporter | ||
Comment 5•13 years ago
|
||
like says Jesse Ruderman : it's likely to require a different fix (maybe even an API change between Firefox and Java).
Reporter | ||
Updated•13 years ago
|
Summary: Navigation away from a page with multiple active <select> dropdown menu can be used for Spoofing And ClickJacking with Java applet → Firefox 3.6.X : Navigation away from a page with multiple active <select> dropdown menu can be used for Spoofing And ClickJacking with Java applet
Comment 6•13 years ago
|
||
if you can do this w/out XUL it looks sg:critical to me, if it requires XUL then it's probably sg:moderate at best.
Reporter | ||
Comment 8•13 years ago
|
||
No update for Firefox 3.6.X ?
On Firefox 3.6.X it's a critical issue !
Reporter | ||
Comment 9•13 years ago
|
||
I can do this without XUL but with only ONE <SELECT> element.
SG:CRITICAL?
Reporter | ||
Comment 10•13 years ago
|
||
this <select> element can cover "X" and "Annuler" button!
Reporter | ||
Comment 11•13 years ago
|
||
Let me know if you want a new testcase with only ONE <select> for covers "X" and "Annuler" button.
if you don't need a testcase : "sg:critical" ?
Comment 12•13 years ago
|
||
I'd like to see the new testcase.
Reporter | ||
Comment 13•13 years ago
|
||
Finally without XUL this issue isn't credible...
This issue use XUL for make the <select> menu persist !
No update after Mozilla Firefox 3.6.23?
Comment 14•13 years ago
|
||
3.6.x is still supported for a while. I don't know when, but we're accepting security bugs for the bounty program until we announce it is end-of-life.
Whiteboard: [sg:high]
Comment 15•13 years ago
|
||
Similar to bug 575294, maybe something in that patch (in progress) will help here?
blocking1.9.2: --- → ?
status1.9.2:
--- → wanted
Reporter | ||
Comment 16•13 years ago
|
||
UNCONFIRMED => NEW or ASSIGNED?
Updated•13 years ago
|
Status: UNCONFIRMED → NEW
Ever confirmed: true
Whiteboard: [sg:high] → [sg:high] reqs Java
Comment 17•13 years ago
|
||
Olli: will a fix for bug 575294 also fix this case? Is there any special case we can use to detect the loss of focus to a non-Firefox dialog (or the Java dialog specifically) and kill the selects?
blocking1.9.2: ? → needed
Depends on: CVE-2012-3984
Updated•13 years ago
|
Component: General → DOM
Product: Firefox → Core
QA Contact: general → general
Version: 3.6 Branch → 1.9.2 Branch
Updated•13 years ago
|
Whiteboard: [sg:high] reqs Java → [sg:critical] reqs Java
Updated•13 years ago
|
status-firefox10:
--- → unaffected
status-firefox7:
--- → unaffected
status-firefox8:
--- → unaffected
status-firefox9:
--- → unaffected
tracking-firefox10:
--- → -
tracking-firefox7:
--- → -
tracking-firefox8:
--- → -
tracking-firefox9:
--- → -
Updated•13 years ago
|
status-firefox11:
--- → unaffected
status-firefox12:
--- → unaffected
Reporter | ||
Comment 18•13 years ago
|
||
JAVA have been updated, now the windows is always on top and visible BUT we can bypass it with setTimeout("window.moveTo(0,0)", 1900); on the Applet webpage for make unvisible the JAVA Windows!
I can sent you a new Proof Of Concept if you want.
Reporter | ||
Comment 19•13 years ago
|
||
I've found a similare vulnerability that works on 10.0.1 without XUL.
https://bugzilla.mozilla.org/show_bug.cgi?id=726264
Updated•13 years ago
|
status-firefox13:
--- → unaffected
status-firefox14:
--- → unaffected
Comment 20•13 years ago
|
||
(In reply to Daniel Veditz [:dveditz] from comment #17)
> Olli: will a fix for bug 575294 also fix this case? Is there any special
> case we can use to detect the loss of focus to a non-Firefox dialog (or the
> Java dialog specifically) and kill the selects?
Olli, any comments on this?
Comment 21•13 years ago
|
||
Since this particular bug requires XUL, which makes it not an issue past Firefox 3.6, and Firefox 3.6 is reaching EOL, marking this WONTFIX. I don't think we'll be backporting any potential fix for bug 575294.
Status: NEW → RESOLVED
Closed: 13 years ago
Resolution: --- → WONTFIX
Updated•13 years ago
|
No longer depends on: CVE-2012-3984
Updated•13 years ago
|
Depends on: CVE-2012-3984
Updated•13 years ago
|
Group: core-security
Reporter | ||
Updated•13 years ago
|
Reporter | ||
Comment 22•13 years ago
|
||
if this bug is publicly open, it's possible for an malicious hacker to use this information for code a exploit for firefox 14.0.1
Updated•13 years ago
|
Group: core-security
Comment 23•13 years ago
|
||
Sorry for unhiding. I noticed bug 575294 was fixed but forgot to check which versions.
Whiteboard: [sg:critical] reqs Java → [sg:critical] (reqs Java) keep hidden while bug 575294 is
Comment 25•10 years ago
|
||
(In reply to Daniel Veditz [:dveditz] from comment #23)
> Sorry for unhiding. I noticed bug 575294 was fixed but forgot to check which
> versions.
This comment added "keep hidden while bug 575294 is" to whiteboard. Looks like bug 575294 was un-hidden just over a year ago. Can we un-hide this one (and related bug 726264) as well, now?
Flags: needinfo?(dveditz)
Updated•10 years ago
|
Group: core-security
Flags: needinfo?(dveditz)
Reporter | ||
Updated•10 years ago
|
Resolution: WONTFIX → DUPLICATE
Assignee | ||
Updated•6 years ago
|
Component: DOM → DOM: Core & HTML
Updated•9 months ago
|
Keywords: reporter-external
You need to log in
before you can comment on or make changes to this bug.
Description
•