Closed
Bug 980355
Opened 11 years ago
Closed 11 years ago
Plugin block: Cisco Jabber SDK for Web < 3.0.6
Categories
(Toolkit :: Blocklist Policy Requests, defect)
Tracking
()
RESOLVED
FIXED
2014-06
People
(Reporter: benjamin, Assigned: jorgev)
References
Details
(Keywords: qawanted, Whiteboard: [kb=1398505])
Attachments
(2 files)
See bug 980133 for details: we should issue a block for the Cisco Jabber SDK for Web plugin versions less than 3.0.6 because of a security issue. If this plugin is in plugincheck that should be updated as well.
about:plugins details are in attachment 8386489 [details] from that bug.
Cisco will do the QA for this once it is staged.
Flags: needinfo?(cbook)
| Assignee | ||
Comment 1•11 years ago
|
||
The blocks have been staged:
https://addons-dev.allizom.org/en-US/firefox/blocked/p543 (Windows)
https://addons-dev.allizom.org/en-US/firefox/blocked/p545 (Mac)
Keywords: qawanted
| Reporter | ||
Comment 2•11 years ago
|
||
Vibhavaree here are instructions for verifying the blocks: https://wiki.mozilla.org/Blocklisting/Testing
Could you or your QA org verify that the blocks are working correctly for old versions of the plugin and don't affect the most recent version?
Flags: needinfo?(vgargeya)
Comment 3•11 years ago
|
||
hm so far this plugin is not in plugincheck, i tried to add/download this plugin but got " To Download this software, you must Log In and have a valid service contract associated to your Cisco.com profile." ..
Would be helpful if someone could provide the information from http://ozten.com/random/perfidies/debug.html if we want to add this plugin to plugincheck
Flags: needinfo?(cbook)
| Reporter | ||
Comment 4•11 years ago
|
||
Tomcat, I believe the information you need is found in the powerpoint attachment linked in comment 0.
Comment 5•11 years ago
|
||
(In reply to Benjamin Smedberg [:bsmedberg] from comment #4)
> Tomcat, I believe the information you need is found in the powerpoint
> attachment linked in comment 0.
oh thanks. Could someone provide me with the exact version number of the vulnerable plugin. Plugincheck needs this because i can only mark "old" versions as vulnerable and from then the "new" version as latest
| Reporter | ||
Comment 6•11 years ago
|
||
I don't understand the question. 3.0.6 is the good version, and 3.0.5 and all previous versions are the unsafe versions.
Comment 7•11 years ago
|
||
(In reply to Benjamin Smedberg [:bsmedberg] from comment #6)
> I don't understand the question. 3.0.6 is the good version, and 3.0.5 and
> all previous versions are the unsafe versions.
according to the attached file the current version is 3.0.6.x and would be helpful for plugincheck if we know what the exact version number is for 3.0.5.x is
The release version for 3.0.5.x (also referred to as 9.2 MR5) is 3.0.5.156990
Flags: needinfo?(vgargeya)
We'd like the "update now" link that is presented in the click-to-activate dialog, and the add-on manager to point to a location that provides information on how users can get a later version of the plug-in. What's the process? Do we just send you the link?
| Reporter | ||
Comment 10•11 years ago
|
||
That link is currently hard-coded to go the the Mozilla plugincheck page: http://www.mozilla.org/en-US/plugincheck/
Tomcat it working to add your plugin to plugincheck and that page can link to wherever you choose.
Comment 11•11 years ago
|
||
okay, thank you. we'll provide the link.
Comment 12•11 years ago
|
||
I tested on a Mac 10.9 to see if a 3.0.5 version of the plugin would be blocked.
It was not blocked.
Comment 13•11 years ago
|
||
Added an attachment showing the about:plugins info for the 3.0.5 version of the plugin, as it appears in Firefox on a Mac 10.9.
| Reporter | ||
Comment 14•11 years ago
|
||
Cisco Web Communicator
File: CiscoWebCommunicator.plugin
Path: /Library/Internet Plug-Ins/CiscoWebCommunicator.plugin
Version: 3.0.5.156990
State: Enabled
Cisco Unified Communication System Release 9.2 MR5 : CWC version 3.0.5.156990
Flags: needinfo?(jorge)
Comment 15•11 years ago
|
||
created the plugin now, let me know about the feedback also about the url form comment #11
| Assignee | ||
Comment 16•11 years ago
|
||
Rich, can you confirm that you followed the steps on this page: https://wiki.mozilla.org/Blocklisting/Testing. Also, can you check your Firefox profile folder for file blocklist.xml and see if you find an entry with ID p545?
Flags: needinfo?(jorge) → needinfo?(ramerman)
Comment 17•11 years ago
|
||
Jorge, I tried out the Aurora channel, Firefox 29, and noticed that the plug-in block is working on Mac. I must have been doing something wrong for the Mac when trying to follow the Blocklisting Testing steps. I'm not concerned about it now, though. Thanks for following up :-)
Flags: needinfo?(ramerman)
Comment 18•11 years ago
|
||
We are working on getting a landing page up for the update url. will post when it is ready.
Comment 19•11 years ago
|
||
Here is the landing page for the update url. Please let us know when this is linked:
https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user
Comment 20•11 years ago
|
||
Can you let us know what version of Firefox this block will go live in? thank you.
Flags: needinfo?(jorge)
| Assignee | ||
Comment 21•11 years ago
|
||
Tomcat, please give comment #19 a look.
(In reply to vgargeya from comment #20)
> Can you let us know what version of Firefox this block will go live in?
> thank you.
We will push the block live once the plugin update info is updated. It's a server-side change, so it doesn't need to align with a release. It will apply for all Firefox versions.
Flags: needinfo?(jorge) → needinfo?(cbook)
Comment 22•11 years ago
|
||
was this testing done, see comment #11 and was this ok for plugincheck ?
Flags: needinfo?(cbook)
Comment 23•11 years ago
|
||
See comment 10 - does plugin check now direct to the new landing page - https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user ?
If so, we can test it out. Tomcat, please confirm that the work to direct to link above is complete. we can test it out on allizom.
Comment 24•11 years ago
|
||
(In reply to vgargeya from comment #23)
> See comment 10 - does plugin check now direct to the new landing page -
> https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-
> test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user ?
> If so, we can test it out. Tomcat, please confirm that the work to direct to
> link above is complete. we can test it out on allizom.
Hi, should be all ready to test on https://www.mozilla.org/en-US/plugincheck/ (in about 30 minutes from now when the cache clears etc)
Comment 26•11 years ago
|
||
I can't currently get Firefox to block the plugin.
Briefly, I saw that it blocked the plugin, and the update link led to a page that said it could not find what was being looked for.
I'd like to repro that situation, but currently Firefox is not having a problem with the plugin.
Here is the string I am using for extensions.blocklist.url:
https://addons-dev.allizom.org/blocklist/3/%APP_ID%/%APP_VERSION%/%PRODUCT%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/%PING_COUNT%/%TOTAL_PING_COUNT%/%DAYS_SINCE_LAST_PING%/
Is that the correct string? Is there something else I am supposed to be doing to access the staged block-ins?
| Assignee | ||
Comment 27•11 years ago
|
||
The staging server has its DB synced every so often, so the blocks can disappear. Here they are again:
https://addons-dev.allizom.org/en-US/firefox/blocked/p564
https://addons-dev.allizom.org/en-US/firefox/blocked/p566
Please give them a try as soon as possible.
Comment 28•11 years ago
|
||
Thanks, Jorge. I was able to get Firebox to block the Cisco Web Communicator plug-in.
When I click the Update link on Windows, it takes me to https://addons-mozilla.org/en-US/firefox/blocked/p564, which does not exist. I suppose that makes sense, since it is the staging site at addons-dev.allizom.org that currently has p564 and p566 posted.
However, we want the update link to go to:
https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user
Can you please change the Update link to go to that url?
| Assignee | ||
Comment 29•11 years ago
|
||
(In reply to Rich Amerman from comment #28)
> When I click the Update link on Windows, it takes me to
> https://addons-mozilla.org/en-US/firefox/blocked/p564, which does not exist.
I'm not sure why that's happening. I *think* it should take to wherever the plugin finder service tells you. Benjamin, do you know?
Flags: needinfo?(benjamin)
| Reporter | ||
Comment 30•11 years ago
|
||
The update link should currently always go to plugincheck (http://www.mozilla.org/en-US/plugincheck/). bug 873093 is on file to make that customizable from the blocklist but that appears to have stalled.
Flags: needinfo?(benjamin)
Comment 31•11 years ago
|
||
Thanks for the explanation, Benjamin. Just to make sure I understand, the flow we should expect to see, when the block for Cisco Web Communicator is deployed to production, is that the update link will go to plugincheck. From there, an update link for Cisco Web Communictor will go to the link we want, which is:
https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user
Does that sound correct?
Will there be a way for us to verify this while the block is still being staged?
Flags: needinfo?(benjamin)
| Reporter | ||
Comment 32•11 years ago
|
||
That is correct. The interaction of plugincheck and the blocklist isn't ideal.
Tomcat, is plugincheck live?
Flags: needinfo?(benjamin) → needinfo?(cbook)
Comment 34•11 years ago
|
||
If I go to https://www.mozilla.org/en-US/plugincheck/ from a Windows 7 machine with Cisco Web Communicator installed, the page that comes up shows the plug-in as unknown, with a Research button, not an Update button. The Research button goes to a Google search of "current version plugin Cisco Web Communicator"
Is that expected behavior at this stage of the roll-out of the plugin block?
In case it matters, I also have extensions.block.url set to point to the addon-devs.allizom.org server, so that the plug-in is in fact blocked for Firefox on the machine.
Flags: needinfo?(cbook)
Comment 36•11 years ago
|
||
(In reply to Rich Amerman from comment #34)
> If I go to https://www.mozilla.org/en-US/plugincheck/ from a Windows 7
> machine with Cisco Web Communicator installed, the page that comes up shows
> the plug-in as unknown, with a Research button, not an Update button. The
> Research button goes to a Google search of "current version plugin Cisco Web
> Communicator"
>
> Is that expected behavior at this stage of the roll-out of the plugin block?
>
> In case it matters, I also have extensions.block.url set to point to the
> addon-devs.allizom.org server, so that the plug-in is in fact blocked for
> Firefox on the machine.
was this with the latest plugin ? If this the plugin is blocked, this might affect plugincheck too
Comment 37•11 years ago
|
||
(In reply to Carsten Book [:Tomcat] from comment #36)
> (In reply to Rich Amerman from comment #34)
> > If I go to https://www.mozilla.org/en-US/plugincheck/ from a Windows 7
> > machine with Cisco Web Communicator installed, the page that comes up shows
> > the plug-in as unknown, with a Research button, not an Update button. The
> > Research button goes to a Google search of "current version plugin Cisco Web
> > Communicator"
> >
> > Is that expected behavior at this stage of the roll-out of the plugin block?
> >
> > In case it matters, I also have extensions.block.url set to point to the
> > addon-devs.allizom.org server, so that the plug-in is in fact blocked for
> > Firefox on the machine.
>
> was this with the latest plugin ? If this the plugin is blocked, this might
> affect plugincheck too
Plugincheck shows the Cisco Web Communicator plug-in as unknown, whether the plug-in version is 3.0.5 (blocked) or 3.0.6 (unblocked).
Comment 38•11 years ago
|
||
Benjamin, Carsten,
This is waiting on the update links in the block flow directing the user to https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user ?
If this can please be implemented, we can test it and close this out.
Also we can get on a WebEx session if that is helpful. Just let me know and I can schedule it.
Thank you,
-Vibhavaree
Flags: needinfo?(vgargeya)
Flags: needinfo?(cbook)
Flags: needinfo?(benjamin)
Comment 39•11 years ago
|
||
jorge i guess this is more for you.
(In reply to vgargeya from comment #38)
> Benjamin, Carsten,
> This is waiting on the update links in the block flow directing the user to
> https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-
> test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user ?
>
> If this can please be implemented, we can test it and close this out.
>
> Also we can get on a WebEx session if that is helpful. Just let me know and
> I can schedule it.
>
> Thank you,
> -Vibhavaree
Flags: needinfo?(cbook) → needinfo?(jorge)
| Reporter | ||
Comment 40•11 years ago
|
||
cbook no, the builtin blocking only links to plugincheck. The problem seems to be that plugincheck is not taking these users to the correct URL. That is something you need to fix, AIUI.
Flags: needinfo?(jorge)
Flags: needinfo?(cbook)
Flags: needinfo?(benjamin)
Comment 41•11 years ago
|
||
Yes, we want "update now" links to take the user to - https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user
where they can get information on upgrading the plugin.
Comment 42•11 years ago
|
||
Spoke to Carsten on IRC this morning. I am going to get the current bug I worked on out the door and then implement what is requested here.
One important thing to note here though is that we will need a way to test this to ensure this works as we expect (even though this feature will not be implemented just for this plugin). To this end, can someone point me to where I can get hold of the latest stable version of the plugin and then also, the vulnerable version mentioned here?
Thanks!
Flags: needinfo?(vgargeya)
Flags: needinfo?(benjamin)
Updated•11 years ago
|
Flags: needinfo?(cbook)
| Reporter | ||
Comment 43•11 years ago
|
||
espressive I'm confused. Plugincheck already has the ability to show an update link for plugins, no? I didn't think any coding would be necessary for this, just updating the database.
In general, QA should be completed by Cisco. Bug 980133 has a download URL of http://software.cisco.com/download/release.html?mdfid=283882159&softwareid=283995793&release=9.0%25281%2529&relind=AVAILABLE&rellifecycle=&reltype=latest but I'm not sure which version that takes you to.
Flags: needinfo?(benjamin)
Comment 44•11 years ago
|
||
(In reply to Benjamin Smedberg [:bsmedberg] from comment #43)
> espressive I'm confused. Plugincheck already has the ability to show an
> update link for plugins, no? I didn't think any coding would be necessary
> for this, just updating the database.
>
> In general, QA should be completed by Cisco. Bug 980133 has a download URL
> of
> http://software.cisco.com/download/release.
> html?mdfid=283882159&softwareid=283995793&release=9.
> 0%25281%2529&relind=AVAILABLE&rellifecycle=&reltype=latest but I'm not sure
> which version that takes you to.
Indeed it does, however, I am not 100% sure on which URL it is passed from the back-end. Looking at the DB the vulnerability_url points to the URL mentioned by vgargeya@cisco.com
I am looking into this in more detail. The info I mentioned in comment 42 is still something being worked on but, I would have thought the current behaviour would be to use the vulnerability_url when the version is marked vulnerable unless, this entry in the DB is empty.
Will update the bug with what I discover.
Comment 45•11 years ago
|
||
One question, where can I get a version of this plugin? It seems one needs to purchase it.
Comment 46•11 years ago
|
||
Schalk, you can obtain an evaluation version here -
https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/downloads-and-docs/
Please see Plug-in section, Evaluation version toward the middle of the page.
Further, you can download the SDK, which has a sample web application you can use to try out the plug-in.
Flags: needinfo?(vgargeya)
Comment 47•11 years ago
|
||
(In reply to vgargeya from comment #46)
> Schalk, you can obtain an evaluation version here -
> https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-
> test/voice-and-video/downloads-and-docs/
> Please see Plug-in section, Evaluation version toward the middle of the
> page.
>
> Further, you can download the SDK, which has a sample web application you
> can use to try out the plug-in.
Thanks!
Comment 48•11 years ago
|
||
(In reply to vgargeya from comment #46)
> Schalk, you can obtain an evaluation version here -
> https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-
> test/voice-and-video/downloads-and-docs/
> Please see Plug-in section, Evaluation version toward the middle of the
> page.
On which platforms and browsers does the plugin work?
Windows [versions?]
Mac [versions?]
Linux?
Browsers?
Thanks!
At the moment, I am still seeing that the plugin is shown as unknown so, I am digging further. Thank you for your patience on this matter.
Updated•11 years ago
|
Assignee: jorge → schalk.neethling.bugs
Comment 49•11 years ago
|
||
So, I believe I found the reason why it is displayed as unknown. There are no mime types associated with the plugin entry. I am going to fix this in the DB and continue testing from there.
Comment 50•11 years ago
|
||
This pull request resolved the problem of reporting this plugin as unknown (there was some additional info needed in the DB as well). Once this has been merged, I will open the required PR against mozilla.org and update this bug once the changes are on stage for vgargeya to QA:
https://github.com/ossreleasefeed/Perfidies-of-the-Web/pull/8
Comment 51•11 years ago
|
||
PR for Bedrock i.e. mozilla.org side of this is now open:
https://github.com/mozilla/bedrock/pull/2076
Updated•11 years ago
|
Whiteboard: [kb=1398505]
Comment 52•11 years ago
|
||
Commits pushed to master at https://github.com/mozilla/bedrock
https://github.com/mozilla/bedrock/commit/47184fca9317b44dfb09b8f748cbaab1b89168bb
Fix Bug 980355, correct cisco communicator detection and use vulnerability urls when available
https://github.com/mozilla/bedrock/commit/440fab0d61a1a84fcfe23525b6dc131df1fc0b63
Merge pull request #2076 from ossreleasefeed/bug980355-correct-cisco-web-communicator-reporting
Fix Bug 980335, correct cisco communicator detection and use vulnerability urls when available
Updated•11 years ago
|
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
Comment 53•11 years ago
|
||
This change is now on stage: https://www.allizom.org/en-US/plugincheck/
Comment 54•11 years ago
|
||
Please test https://www.allizom.org/en-US/plugincheck/ and let me know whether we can keep this as fixed or whether you run into problems. Thanks!
Flags: needinfo?(vgargeya)
Comment 55•11 years ago
|
||
Looks mostly good, but I still notice one problem which still needs to be fixed.
First the good behavior:
I verified that https://www.allizom.org/en-US/plugincheck now links to the correct url if from there one hits the Update Now button for the Cisco Web Communicator plugin (Update Now button will be available for a version before 9.2 MR6)).
The above is also true, I noticed, for https://www.mozilla.org/en-US/plugincheck.
I also tested a path all the way from a web app attempting to load a 9.2 MR5 Cisco Web Communicator plugin (red lego piece > press Update Now Link > https://www.mozilla.org/en-US/plugincheck > press Update Now button for Cisco Web Communicator plugin > Cisco's desired URL).
All worked well in that path.
I also verified that https://www.mozilla.org/en-US/plugincheck considers plugin 9.2 MR6 to be up to date.
The problem behavior:
With the 9.2.5 Cisco Web Communicator plugin installed, I went to about:addons. I clicked the Update Now link for the Cisco Web Communicator plugin, and it took me to https://addons.mozilla.org/en-US/firebox/blocked/p564, which is not the correct URL.
This seems like a perfectly valid user path, and so it should also send one to our desired URL as well.
Flags: needinfo?(schalk.neethling.bugs)
Comment 56•11 years ago
|
||
(In reply to Rich Amerman from comment #55)
>
> The problem behavior:
>
> With the 9.2.5 Cisco Web Communicator plugin installed, I went to
> about:addons. I clicked the Update Now link for the Cisco Web Communicator
> plugin, and it took me to
> https://addons.mozilla.org/en-US/firebox/blocked/p564, which is not the
> correct URL.
>
> This seems like a perfectly valid user path, and so it should also send one
> to our desired URL as well.
Regarding plugincheck on mozilla.org, all seems to be good so, I can ask for this to be pushed to production correct?
With regards to about:addons, unfortunately that is not something I work on. Not sure who works on about:addons. I will do my best to figure out where this needs to be changed. Thank you for testing and your feedback.
Flags: needinfo?(schalk.neethling.bugs)
Comment 57•11 years ago
|
||
Hey there Jorge and Benjamin, could you have a look at the problem scenario described in https://bugzilla.mozilla.org/show_bug.cgi?id=980355#c55
Flags: needinfo?(jorge)
Flags: needinfo?(benjamin)
Comment 58•11 years ago
|
||
Thanks for following up on this. Schalk, in response to your question -
"Regarding plugincheck on mozilla.org, all seems to be good so, I can ask for this to be pushed to production correct?"
Yes, if pushing to production is fine. But, please dont close this issue out until the add-on page also links users to -
https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user
Thank you,
-Vibhavaree
Flags: needinfo?(vgargeya)
Comment 59•11 years ago
|
||
Thanks for following up on this. Schalk, in response to your question -
"Regarding plugincheck on mozilla.org, all seems to be good so, I can ask for this to be pushed to production correct?"
Yes, pushing to production is fine. But, please don't close this issue out until the add-on page also links users to -
https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user
Thank you,
-Vibhavaree
| Assignee | ||
Comment 60•11 years ago
|
||
Since blocked plugins aren't necessarily supported in plugincheck, it makes sense to direct users to the blocklist page. That's where they are more likely to find the right link to update. We can add that link to the production block page, but we can't change the Add-ons Manager to point there directly.
Flags: needinfo?(jorge)
Flags: needinfo?(benjamin)
Updated•11 years ago
|
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
Updated•11 years ago
|
Assignee: schalk.neethling.bugs → jorge
| Assignee | ||
Comment 61•11 years ago
|
||
So, are we okay to push the block live?
Comment 62•11 years ago
|
||
Jorge, can the update link please be placed on the blocklist page, if that is where users who click "update now" on the add-ons page will be directed to?
Update link is - https://developer.cisco.com/site/collaboration/jabber/websdk/develop-and-test/voice-and-video/troubleshooting/#plugin_vulnerabilities_user
thank you,
-Vibhavaree
| Assignee | ||
Comment 63•11 years ago
|
||
Yes, that's not a problem.
Comment 64•11 years ago
|
||
Great, Jorge, can we take a look at a staged version to make sure the flow is what we are expecting?
thank you,
-Vibhavaree
| Reporter | ||
Comment 65•11 years ago
|
||
Jorge I think we've tested this sufficiently, please push it live.
| Assignee | ||
Comment 66•11 years ago
|
||
The blocks are now live:
https://addons.mozilla.org/en-US/firefox/blocked/p592
https://addons.mozilla.org/en-US/firefox/blocked/p594
They both link to the update link provided in comment #62.
Status: REOPENED → RESOLVED
Closed: 11 years ago → 11 years ago
Resolution: --- → FIXED
Updated•11 years ago
|
Target Milestone: --- → 2014-06
Comment 67•11 years ago
|
||
I've tested with our plug-in and Firefox version 30 on both Windows and Mac. The plug-in block is implemented properly, including links to the correct url from both the plugin check page and addons page.
Thanks to all of you at Mozilla for your work on this!
Updated•9 years ago
|
Product: addons.mozilla.org → Toolkit
You need to log in
before you can comment on or make changes to this bug.
Description
•