[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.58.0702220046430.6282@dione>
Date: Thu, 22 Feb 2007 00:51:19 +0100 (CET)
From: Michal Zalewski <lcamtuf@...ne.ids.pl>
To: bugtraq@...urityfocus.com
Cc: security@...illa.org, full-disclosure@...ts.grok.org.uk
Subject: Firefox bookmark cross-domain surfing vulnerability
There is an interesting vulnerability in how Firefox handles bookmarks.
The flaw allows the attacker to steal credentials from commonly used
browser start sites (for Firefox, Google is the seldom changed default;
that means exposure of GMail authentication cookies, etc).
The problem: it is relatively easy to trick a casual user into bookmarking
a window that does not point to any physical location, but rather, is an
inline data: URL scheme. When such a link is later retrieved, Javascript
code placed therein will execute in the context of a currently visited
webpage. The destination page can then continue to load without the user
noticing.
The impact of such a vulnerability isn't devastating, but as mentioned
earlier, any attention-grabbing webpage can exploit this to silently
launch attacks against Google, MSN, AOL credentials, etc. In an unlikely
case the victim is browsing local files or special URLs before following a
poisoned bookmark, system compromise is possible.
Thanks to Piotr Szeptynski for bringing up the subject of bookmarks and
inspiring me to dig into this.
Self-explanatory demo page:
http://lcamtuf.coredump.cx/ffbook/
This is being tracked as:
https://bugzilla.mozilla.org/show_bug.cgi?id=371179
/mz
http://lcamtuf.coredump.cx
Powered by blists - more mailing lists