Last Comment Bug 738419 - Malicious "Adobe Flash" add-on
: Malicious "Adobe Flash" add-on
Status: RESOLVED FIXED
:
Product: Toolkit
Classification: Components
Component: Blocklisting (show other bugs)
: unspecified
: All All
: -- normal (vote)
: ---
Assigned To: Jorge Villalobos [:jorgev]
:
Mentors:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2012-03-22 12:54 PDT by MarkH
Modified: 2016-03-07 15:30 PST (History)
4 users (show)
See Also:
Crash Signature:
(edit)
QA Whiteboard:
Iteration: ---
Points: ---
Has Regression Range: ---
Has STR: ---


Attachments
20120305_adobe_flash.zip (password 'infected') (51.71 KB, application/octet-stream)
2012-03-22 12:54 PDT, MarkH
no flags Details

Description MarkH 2012-03-22 12:54:49 PDT
Created attachment 608432 [details]
20120305_adobe_flash.zip (password 'infected')

User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.79 Safari/535.11

Steps to reproduce:

Downloaded the add-on from http://74.81.91[.]227/~twtoolsn/aplicativo/ev.html


Actual results:

This one loads is malicious code from a .xul file to invoke an XHR call to get http://74.81.91/[.]227/~radioour/oi.txt

what's interesting is that it waits 1 sec to inject the contents of oi.txt and has a separate call to re-inject every 600 secs

oi.txt (packed):

steals your cookies/tokens; uses a fixed value for phstamp of 16581666810211869115231

fixed X-SVN-Rev header of '526949'

has you like the following via /ajax/pages/fan_status.php

like("288205791239481");
like("334861906561460");
like("190849364364014");
like("351460511563794");
like("135772513218379");


Expected results:

It shouldn't steal your cookies and make changes to your account without your consent.
Comment 1 Jorge Villalobos [:jorgev] 2012-03-22 14:37:38 PDT
ID: {fa277cfc-1d75-4949-a1f9-4ac8e41b2dfd}
Comment 2 Jorge Villalobos [:jorgev] 2012-03-22 14:39:32 PDT
Blocked: https://addons.mozilla.org/en-US/firefox/blocked/i77

Note You need to log in before you can comment on or make changes to this bug.