Closed
Bug 738419
Opened 12 years ago
Closed 12 years ago
Malicious "Adobe Flash" add-on
Categories
(Toolkit :: Blocklist Policy Requests, defect)
Toolkit
Blocklist Policy Requests
Tracking
()
RESOLVED
FIXED
People
(Reporter: mhammell, Assigned: jorgev)
Details
Attachments
(1 file)
51.71 KB,
application/octet-stream
|
Details |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.79 Safari/535.11 Steps to reproduce: Downloaded the add-on from http://74.81.91[.]227/~twtoolsn/aplicativo/ev.html Actual results: This one loads is malicious code from a .xul file to invoke an XHR call to get http://74.81.91/[.]227/~radioour/oi.txt what's interesting is that it waits 1 sec to inject the contents of oi.txt and has a separate call to re-inject every 600 secs oi.txt (packed): steals your cookies/tokens; uses a fixed value for phstamp of 16581666810211869115231 fixed X-SVN-Rev header of '526949' has you like the following via /ajax/pages/fan_status.php like("288205791239481"); like("334861906561460"); like("190849364364014"); like("351460511563794"); like("135772513218379"); Expected results: It shouldn't steal your cookies and make changes to your account without your consent.
Assignee | ||
Comment 1•12 years ago
|
||
ID: {fa277cfc-1d75-4949-a1f9-4ac8e41b2dfd}
Assignee: nobody → jorge
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Assignee | ||
Comment 2•12 years ago
|
||
Blocked: https://addons.mozilla.org/en-US/firefox/blocked/i77
Status: ASSIGNED → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Updated•8 years ago
|
Product: addons.mozilla.org → Toolkit
You need to log in
before you can comment on or make changes to this bug.
Description
•