Closed Bug 738419 Opened 14 years ago Closed 14 years ago

Malicious "Adobe Flash" add-on

Categories

(Toolkit :: Blocklist Policy Requests, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: mhammell, Assigned: jorgev)

Details

Attachments

(1 file)

User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.79 Safari/535.11 Steps to reproduce: Downloaded the add-on from http://74.81.91[.]227/~twtoolsn/aplicativo/ev.html Actual results: This one loads is malicious code from a .xul file to invoke an XHR call to get http://74.81.91/[.]227/~radioour/oi.txt what's interesting is that it waits 1 sec to inject the contents of oi.txt and has a separate call to re-inject every 600 secs oi.txt (packed): steals your cookies/tokens; uses a fixed value for phstamp of 16581666810211869115231 fixed X-SVN-Rev header of '526949' has you like the following via /ajax/pages/fan_status.php like("288205791239481"); like("334861906561460"); like("190849364364014"); like("351460511563794"); like("135772513218379"); Expected results: It shouldn't steal your cookies and make changes to your account without your consent.
ID: {fa277cfc-1d75-4949-a1f9-4ac8e41b2dfd}
Assignee: nobody → jorge
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Status: ASSIGNED → RESOLVED
Closed: 14 years ago
Resolution: --- → FIXED
Product: addons.mozilla.org → Toolkit
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: