Last Comment Bug 759164 - Malicious "FlashPlayer" add-on
: Malicious "FlashPlayer" add-on
Product: Toolkit
Classification: Components
Component: Blocklisting (show other bugs)
: unspecified
: All All
-- normal (vote)
: ---
Assigned To: Jorge Villalobos [:jorgev]
: Jorge Villalobos [:jorgev]
Depends on:
  Show dependency treegraph
Reported: 2012-05-28 12:09 PDT by MarkH
Modified: 2016-03-07 15:30 PST (History)
4 users (show)
See Also:
Crash Signature:
QA Whiteboard:
Iteration: ---
Points: ---
Has Regression Range: ---
Has STR: ---

Attachments (password 'malwares4mple') (16.12 KB, application/octet-stream)
2012-05-28 12:09 PDT, MarkH
no flags Details

Description User image MarkH 2012-05-28 12:09:02 PDT
Created attachment 627759 [details] (password 'malwares4mple')

User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.52 Safari/536.5

Steps to reproduce:

Downloaded extension from

Actual results:

After install, the plugin injects packed JS to inject (Javascript)


js_f.php (packed JS):

injects an iframe pointing to

steals the Facebook user's session tokens

sets cookies px_<UID> and fb_bbip_* to maintain state

can like an arbitrary set of Facebook pages (currently not set to like any)

posts a link to http://bit[.]ly/MTfe4S
as a status update by the victim with the text "Kirst*en. Dunst mastur*bating on hidden camera"

will solve captchas by posting the captcha image to 

posts a link to http://tol[.]co/5q, with the text "LOL Miley Cyrus got caught having s3x"

Expected results:

It should not steal your Facebook session information and post to Facebook as you, without your consent.
Comment 1 User image Jorge Villalobos [:jorgev] 2012-05-28 13:41:27 PDT
Comment 2 User image Jorge Villalobos [:jorgev] 2012-05-28 13:43:22 PDT

Note You need to log in before you can comment on or make changes to this bug.