Closed
Bug 726264
Opened 13 years ago
Closed 13 years ago
(CVE-2012-3984) Firefox 10.0.1 : Navigation away from a page with multiple active <select> dropdown menu can be used for Spoofing And ClickJacking with XPI using window.open and geolocalisation
Categories
(Core :: Layout: Form Controls, defect)
Tracking
()
People
(Reporter: jordi.chancel, Assigned: MatsPalmgren_bugz)
References
()
Details
(Keywords: csectype-clickjacking, sec-critical, Whiteboard: [sg:critical][advisory-tracking+] cross-browser issue (Chrome, Opera))
Attachments
(3 files, 2 obsolete files)
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:10.0.1) Gecko/20100101 Firefox/10.0.1
Build ID: 20120208060813
Steps to reproduce:
Like bug 575294 , Firefox 10.0.1 shows the dropdown menu for <select> elements as an always-on-top chromeless window. It also allows arbitrary HTML content to be rendered in the <option> elements within the <select>.
Actual results:
This bug demonstrates than an attacker can cover a XPI for evil.
I think this issue is critical.
Reporter | ||
Updated•13 years ago
|
Reporter | ||
Comment 1•13 years ago
|
||
this issue works only if a user disabled the pop-up blocker or allowed pop-ups for this site.
Reporter | ||
Comment 2•13 years ago
|
||
Reporter | ||
Updated•13 years ago
|
Attachment #596280 -
Attachment is obsolete: true
Reporter | ||
Updated•13 years ago
|
Attachment #596272 -
Attachment is obsolete: true
Reporter | ||
Comment 3•13 years ago
|
||
Reporter | ||
Comment 4•13 years ago
|
||
Reporter | ||
Updated•13 years ago
|
Reporter | ||
Comment 5•13 years ago
|
||
With an additional vulnerability like bug 645699 (Non-whitelisted site can trigger xpinstall) this vulnerability don't requiere to click on the XPI dialog pre-loading.
Reporter | ||
Comment 6•13 years ago
|
||
This issue works on Opera 11.61 too!
Comment 7•13 years ago
|
||
Confirming. This is worth investigating.
Status: UNCONFIRMED → NEW
Ever confirmed: true
Updated•13 years ago
|
Depends on: CVE-2012-3984
Whiteboard: [sg:high]
Comment 8•13 years ago
|
||
Mats: can you take a look at this and add your findings? It seems we should ensure that we destroy any floating <select> widgets when the doc has gone out of focus.
Assignee: nobody → matspal
Status: NEW → ASSIGNED
Assignee | ||
Comment 9•13 years ago
|
||
Olli, will this be fixed by your patch in bug 575294?
Comment 10•13 years ago
|
||
Reporter | ||
Comment 11•13 years ago
|
||
I'm the reporter of this vuln but i can't see the attachment 598409 [details]!
Reporter | ||
Comment 12•13 years ago
|
||
confidence reigns!
Comment 13•13 years ago
|
||
The attachment you can't see is a placeholder related to the bug bounty. Its contents are "Security Bug Bounty nomination placeholder". It's a kludge to work around a missing Bugzilla feature.
http://www.mozilla.org/security/bug-bounty.html
Reporter | ||
Comment 14•13 years ago
|
||
I've found a new way for allow this clickjacking/spoofing attack with document.location (so without window.open).
Can i report this?
Comment 15•13 years ago
|
||
(In reply to Jordi Chancel from comment #14)
> I've found a new way for allow this clickjacking/spoofing attack with
> document.location (so without window.open).
>
> Can i report this?
Feel free to open an additional security bug or e-mail security@mozilla.org with the details encrypted with our key from http://www.mozilla.org/security/.
Reporter | ||
Comment 16•13 years ago
|
||
(In reply to Al Billings [:abillings] from comment #15)
> (In reply to Jordi Chancel from comment #14)
> > I've found a new way for allow this clickjacking/spoofing attack with
> > document.location (so without window.open).
> >
> > Can i report this?
>
> Feel free to open an additional security bug or e-mail security@mozilla.org
> with the details encrypted with our key from
> http://www.mozilla.org/security/.
reported => https://bugzilla.mozilla.org/show_bug.cgi?id=729475
Updated•13 years ago
|
Attachment #596294 -
Attachment mime type: application/octet-stream → application/java-archive
Comment 19•13 years ago
|
||
For bounty purposes this appears to be essentially the same as bug 691014, a specific example that proved bug 575294 is critically dangerous. We still need to fix bug 575294 and when we do this problem will also be fixed.
Whiteboard: [sg:high] → [sg:critical]
Updated•13 years ago
|
status-firefox-esr10:
--- → affected
status-firefox12:
--- → affected
status-firefox13:
--- → affected
status-firefox14:
--- → affected
tracking-firefox-esr10:
--- → 12+
tracking-firefox12:
--- → +
tracking-firefox13:
--- → +
tracking-firefox14:
--- → +
Comment 20•13 years ago
|
||
->Core::Widget like bug 575294
Assignee: matspal → nobody
Component: Untriaged → Widget
Product: Firefox → Core
QA Contact: untriaged → general
Updated•13 years ago
|
Assignee: nobody → matspal
Assignee | ||
Updated•13 years ago
|
Component: Widget → Layout: Form Controls
OS: Windows 7 → All
QA Contact: general → layout.form-controls
Hardware: x86_64 → All
Assignee | ||
Comment 21•13 years ago
|
||
This issue is orthogonal to bug 575294.
The problem here is that we open the dropdown menu before the
control has focus so we never get a blur which would close it.
The suggested fix is to delay opening the menu until we get
focus -- and if we never get it the focus has moved somewhere
else (as is the case when opening a new window from onmousedown)
and there's no need to open it (we normally close it on blur).
Attachment #612672 -
Flags: review?(bugs)
Assignee | ||
Comment 22•13 years ago
|
||
Try build (including bug 575294) is green on all platforms.
The builds are available for testing here:
https://ftp.mozilla.org/pub/mozilla.org/firefox/try-builds/mpalmgren@mozilla.com-748972c39205/
Reporter | ||
Comment 23•13 years ago
|
||
fixed for me
Comment 24•13 years ago
|
||
Comment on attachment 612672 [details] [diff] [review]
fix
>
>+ /** Current state of the dropdown list, true is dropped down. */
>+ bool mDroppedDown;
>+ /** See comment in HandleRedisplayTextEvent(). */
>+ bool mInRedisplayText;
>+ /** Acting on ShowDropDown(true) is delayed until we're focused. */
>+ bool mDelayedShowDropDown;
>+
The code around uses // comments.
Attachment #612672 -
Flags: review?(bugs) → review+
Assignee | ||
Comment 25•13 years ago
|
||
> The code around uses // comments.
OK, I'll change it to // for consistency.
Reporter | ||
Comment 26•13 years ago
|
||
It will be fabulous if This bug will be fixed with other of my bug like Bug 687745 and Bug 700080! :)
Reporter | ||
Comment 27•13 years ago
|
||
like three vulnerability of me into the same update 8D !
Reporter | ||
Updated•13 years ago
|
Whiteboard: [sg:critical] → [sg:critical] cross-browser issue (Chrome, Opera)
Comment 28•13 years ago
|
||
Mats, when do we expect this to land?
Assignee | ||
Comment 29•13 years ago
|
||
I'm waiting for review in bug 575294. I'd like to push them together since that's
the combination I've tested, and also to not draw unnecessary attention to <select>
before both lands.
Updated•13 years ago
|
tracking-firefox-esr10:
12+ → ---
Updated•13 years ago
|
![]() |
||
Updated•13 years ago
|
Keywords: sec-critical
Assignee | ||
Updated•13 years ago
|
No longer depends on: CVE-2012-3984
Assignee | ||
Updated•13 years ago
|
Depends on: CVE-2012-3984
Comment 31•13 years ago
|
||
Mats let us know this is likely too risky to get into FF13. Marking 14+ for the ESR.
Assignee | ||
Comment 32•13 years ago
|
||
Target Milestone: --- → mozilla15
Comment 33•13 years ago
|
||
Backed out in https://hg.mozilla.org/integration/mozilla-inbound/rev/8a8c0d8b1ac7 - something in that push caused bug 759243, where test_hiddenitems.xul failed every run but didn't get counted as a failure unless something else in the run failed.
Assignee | ||
Comment 34•13 years ago
|
||
Comment 35•13 years ago
|
||
Status: ASSIGNED → RESOLVED
Closed: 13 years ago
Resolution: --- → FIXED
Assignee | ||
Comment 36•13 years ago
|
||
The patch here is fine, but it was backed out since it was in the same
range as bug 575294 that got backed out:
Backed out bug 575294 and bug 726264:
https://tbpl.mozilla.org/?usebuildbot=1&rev=e7ca047b71b2
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
Updated•13 years ago
|
Comment 37•13 years ago
|
||
This bug does not have a patch landed on m-c, so clearing the ESR tracking flag for now.
tracking-firefox-esr10:
14+ → ---
Assignee | ||
Comment 38•13 years ago
|
||
Target Milestone: mozilla15 → mozilla16
Assignee | ||
Comment 39•13 years ago
|
||
https://hg.mozilla.org/mozilla-central/rev/e3676fde39a8
https://hg.mozilla.org/mozilla-central/rev/23f5c88adb8f
https://hg.mozilla.org/mozilla-central/rev/612ee5c6300d
https://hg.mozilla.org/mozilla-central/rev/b47364c051d2
https://hg.mozilla.org/mozilla-central/rev/b2e5b06b0c24
Status: REOPENED → RESOLVED
Closed: 13 years ago → 13 years ago
Resolution: --- → FIXED
Reporter | ||
Comment 40•13 years ago
|
||
when this vulnerability will be fixed on a stable update?
Assignee | ||
Comment 41•13 years ago
|
||
Correction: the changesets in comment 39 were for bug 575294.
This is the one for this bug:
https://hg.mozilla.org/mozilla-central/rev/cc89df1b08ae
Updated•13 years ago
|
Updated•13 years ago
|
tracking-firefox-esr10:
--- → ?
Updated•13 years ago
|
Comment 42•13 years ago
|
||
Does this patch rely upon bug 575294 to be resolved? If so, we can wontfix for FF15 (it'll land in FF16 first).
Comment 43•13 years ago
|
||
Waiting until Mats returns from vacation this coming Monday 8/6 to confirm.
Assignee | ||
Comment 44•13 years ago
|
||
(In reply to Alex Keybl [:akeybl] from comment #42)
> Does this patch rely upon bug 575294 to be resolved? If so, we can wontfix
> for FF15 (it'll land in FF16 first).
Yeah, I don't think we should take this patch without bug 575294.
It's unclear how well this patch alone would work and this code
is rather error prone, so I wouldn't want to bake this on beta.
Comment 45•13 years ago
|
||
Thanks Mats, we'll wontfix this for Beta then and please nominate for esr10 landing which we can approve after merge/esr10.0.7 release.
Reporter | ||
Comment 46•12 years ago
|
||
Firefox 15.0.1 don't fixe this vulnerability.
I have reported a critical way of this vuln last year ...
PLEASE UPDATE to Fix this vulnerability ... it's too long...
Comment 47•12 years ago
|
||
As mentioned in the status flags in this bug and in bug 575294, these bugs are fixed in Firefox 16.
Comment 48•12 years ago
|
||
Similar to bug 575294, Mats and Release Management have agreed that we can wontfix for ESR based upon the risk profile here and instead get it fixed in the first ESR17 release.
Updated•12 years ago
|
Whiteboard: [sg:critical] cross-browser issue (Chrome, Opera) → [sg:critical][advisory-tracking+] cross-browser issue (Chrome, Opera)
Reporter | ||
Updated•10 years ago
|
Summary: Firefox 10.0.1 : Navigation away from a page with multiple active <select> dropdown menu can be used for Spoofing And ClickJacking with XPI using window.open and geolocalisation → (CVE-2012-3984) Firefox 10.0.1 : Navigation away from a page with multiple active <select> dropdown menu can be used for Spoofing And ClickJacking with XPI using window.open and geolocalisation
Comment 49•10 years ago
|
||
Does this bug still need to be hidden?
I'm guessing the reason we didn't un-hide it long ago is that this was a cross-browser issue (as noted in whiteboard field). But I'd hope the other affected browsers have shipped fixes now.
Comment 50•10 years ago
|
||
(and if we can un-hide this bug, then we can probably un-hide the dupe [bug 729475] as well.)
Updated•10 years ago
|
Flags: needinfo?(dveditz)
Reporter | ||
Comment 51•10 years ago
|
||
no it's a bad idea,
don't un-hide this bug please because others very similare vulnerabilities bugs are unpatched like bug 884488 ; bug 941482 ; bug 952951 (and others).
so please let this bug private until other similare bug are patched .
Thanks.
Flags: needinfo?(dholbert)
Updated•10 years ago
|
Flags: needinfo?(dveditz)
Updated•10 years ago
|
Flags: needinfo?(dholbert)
Updated•10 years ago
|
Group: core-security
Updated•9 months ago
|
Keywords: csectype-clickjacking
You need to log in
before you can comment on or make changes to this bug.
Description
•