Last Comment Bug 738419 - Malicious "Adobe Flash" add-on
: Malicious "Adobe Flash" add-on
Product: Toolkit
Classification: Components
Component: Blocklisting (show other bugs)
: unspecified
: All All
-- normal (vote)
: ---
Assigned To: Jorge Villalobos [:jorgev]
: Jorge Villalobos [:jorgev]
Depends on:
  Show dependency treegraph
Reported: 2012-03-22 12:54 PDT by MarkH
Modified: 2016-03-07 15:30 PST (History)
4 users (show)
See Also:
Crash Signature:
QA Whiteboard:
Iteration: ---
Points: ---
Has Regression Range: ---
Has STR: ---

Attachments (password 'infected') (51.71 KB, application/octet-stream)
2012-03-22 12:54 PDT, MarkH
no flags Details

Description User image MarkH 2012-03-22 12:54:49 PDT
Created attachment 608432 [details] (password 'infected')

User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.79 Safari/535.11

Steps to reproduce:

Downloaded the add-on from http://74.81.91[.]227/~twtoolsn/aplicativo/ev.html

Actual results:

This one loads is malicious code from a .xul file to invoke an XHR call to get http://74.81.91/[.]227/~radioour/oi.txt

what's interesting is that it waits 1 sec to inject the contents of oi.txt and has a separate call to re-inject every 600 secs

oi.txt (packed):

steals your cookies/tokens; uses a fixed value for phstamp of 16581666810211869115231

fixed X-SVN-Rev header of '526949'

has you like the following via /ajax/pages/fan_status.php


Expected results:

It shouldn't steal your cookies and make changes to your account without your consent.
Comment 1 User image Jorge Villalobos [:jorgev] 2012-03-22 14:37:38 PDT
ID: {fa277cfc-1d75-4949-a1f9-4ac8e41b2dfd}
Comment 2 User image Jorge Villalobos [:jorgev] 2012-03-22 14:39:32 PDT

Note You need to log in before you can comment on or make changes to this bug.