Closed Bug 738419 Opened 12 years ago Closed 12 years ago

Malicious "Adobe Flash" add-on

Categories

(Toolkit :: Blocklist Policy Requests, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: mhammell, Assigned: jorgev)

Details

Attachments

(1 file)

User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.79 Safari/535.11

Steps to reproduce:

Downloaded the add-on from http://74.81.91[.]227/~twtoolsn/aplicativo/ev.html


Actual results:

This one loads is malicious code from a .xul file to invoke an XHR call to get http://74.81.91/[.]227/~radioour/oi.txt

what's interesting is that it waits 1 sec to inject the contents of oi.txt and has a separate call to re-inject every 600 secs

oi.txt (packed):

steals your cookies/tokens; uses a fixed value for phstamp of 16581666810211869115231

fixed X-SVN-Rev header of '526949'

has you like the following via /ajax/pages/fan_status.php

like("288205791239481");
like("334861906561460");
like("190849364364014");
like("351460511563794");
like("135772513218379");


Expected results:

It shouldn't steal your cookies and make changes to your account without your consent.
ID: {fa277cfc-1d75-4949-a1f9-4ac8e41b2dfd}
Assignee: nobody → jorge
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Blocked: https://addons.mozilla.org/en-US/firefox/blocked/i77
Status: ASSIGNED → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Product: addons.mozilla.org → Toolkit
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: