Closed
Bug 724669
Opened 12 years ago
Closed 12 years ago
Malicious "Video Premium" add-on
Categories
(Toolkit :: Blocklist Policy Requests, defect)
Toolkit
Blocklist Policy Requests
Tracking
()
RESOLVED
DUPLICATE
of bug 723753
People
(Reporter: mhammell, Assigned: jorgev)
Details
Attachments
(1 file)
25.19 KB,
application/octet-stream
|
Details |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_2) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.77 Safari/535.7 Steps to reproduce: Installed the add-on from vayaina[.]in/video/budado/youtube.xpi Actual results: Add-on loads JS to inject http://budado.info/s.js, which injects http://whos.amung.us/swidget/budado321.gif as an <img> tag and http://budado.info/e/e.js as a <script> tag E.js injects an <iframe> pointing to "http://famoso123.info/video/"+video+"/"+servidor+".html";, where video and servidor are provided at runtime. The iframe is set to cover the webpage the victim is trying to navigate to. Expected results: It shouldn't inject an iframe into the user's tab, covering the intended page.
Assignee | ||
Comment 1•12 years ago
|
||
<em:id>youtb3@youtb3.com</em:id>
Assignee: nobody → jorge
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Assignee | ||
Comment 2•12 years ago
|
||
This is the same ID as bug 723753. Can you confirm that you can still install this add-on without any warnings?
Status: ASSIGNED → RESOLVED
Closed: 12 years ago
Resolution: --- → DUPLICATE
I installed this one prior to filing the bug, no warnings or blocks popped up.
Assignee | ||
Comment 4•12 years ago
|
||
I just tried in several versions of Firefox and the block worked correctly. If you can consistently reproduce in a new profile, please let me know via email and we'll figure it out.
Updated•8 years ago
|
Product: addons.mozilla.org → Toolkit
You need to log in
before you can comment on or make changes to this bug.
Description
•