Closed
Bug 717165
Opened 13 years ago
Closed 13 years ago
Malicious "Youtube player" Add-On
Categories
(Toolkit :: Blocklist Policy Requests, defect)
Toolkit
Blocklist Policy Requests
Tracking
()
RESOLVED
FIXED
People
(Reporter: mhammell, Assigned: jorgev)
Details
Attachments
(1 file)
10.86 KB,
application/octet-stream
|
Details |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_2) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.75 Safari/535.7
Steps to reproduce:
Downloaded and installed the "Youtube player" add-on from a malicious site, http://bbpeonf14.blogspot[.]com/.
The malicious add-ons is currently hosted at http://anyhub[.]net/file/7av-youtube_player.xpi
Actual results:
Once installed, this add-on injects a series of <script> tags and hidden <iframes> into the DOM. Those script tags and iframes continually reload a series of banner ads, to generate revenue for the add-on authors.
It provides no service to the user/victim, does not do what it claims (play Youtube videos), and brings browser performance to a crawl.
Expected results:
It shouldn't have done anything it actually did.
Assignee | ||
Updated•13 years ago
|
Assignee: nobody → jorge
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Assignee | ||
Comment 1•13 years ago
|
||
Status: ASSIGNED → RESOLVED
Closed: 13 years ago
Resolution: --- → FIXED
Comment 2•13 years ago
|
||
Please file these bugs in Blocklisting component in the future.
Component: Add-on Security → Blocklisting
Updated•9 years ago
|
Product: addons.mozilla.org → Toolkit
You need to log in
before you can comment on or make changes to this bug.
Description
•