Closed Bug 755635 Opened 13 years ago Closed 13 years ago

Malicious "Zaman Tuneli Kadir!" add-on

Categories

(Toolkit :: Blocklist Policy Requests, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: mhammell, Assigned: jorgev)

Details

Attachments

(1 file)

User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.46 Safari/536.5 Steps to reproduce: Downloaded add-on from http://zamantunelinikaldir.com/ Actual results: Add-on injects http(s)://www.zamantunelinikaldir.com/timelineremove.js which, provided your referrer is set to Facebook, injects an iframe loading http://www.zamantunelinikaldir/.com/onFrame.html After the iframe loads, the user's Facebook session tokens are stolen and posted to the page loaded in the iframe. Those stolen tokens are then used to spam Facebook. Expected results: It should not steal your session tokens and post them to a 3rd party server.
Id: {68b8676b-99a5-46d1-b390-22411d8bcd61}
Assignee: nobody → jorge
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Status: ASSIGNED → RESOLVED
Closed: 13 years ago
Resolution: --- → FIXED
Product: addons.mozilla.org → Toolkit
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: