lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.58.0702220046430.6282@dione>
Date: Thu, 22 Feb 2007 00:51:19 +0100 (CET)
From: Michal Zalewski <lcamtuf@...ne.ids.pl>
To: bugtraq@...urityfocus.com
Cc: security@...illa.org, full-disclosure@...ts.grok.org.uk
Subject: Firefox bookmark cross-domain surfing vulnerability

There is an interesting vulnerability in how Firefox handles bookmarks.
The flaw allows the attacker to steal credentials from commonly used
browser start sites (for Firefox, Google is the seldom changed default;
that means exposure of GMail authentication cookies, etc).

The problem: it is relatively easy to trick a casual user into bookmarking
a window that does not point to any physical location, but rather, is an
inline data: URL scheme. When such a link is later retrieved, Javascript
code placed therein will execute in the context of a currently visited
webpage. The destination page can then continue to load without the user
noticing.

The impact of such a vulnerability isn't devastating, but as mentioned
earlier, any attention-grabbing webpage can exploit this to silently
launch attacks against Google, MSN, AOL credentials, etc. In an unlikely
case the victim is browsing local files or special URLs before following a
poisoned bookmark, system compromise is possible.

Thanks to Piotr Szeptynski for bringing up the subject of bookmarks and
inspiring me to dig into this.

Self-explanatory demo page:
  http://lcamtuf.coredump.cx/ffbook/

This is being tracked as:
  https://bugzilla.mozilla.org/show_bug.cgi?id=371179

/mz
http://lcamtuf.coredump.cx

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ