Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 58896 - net-www/mozilla-firefox - weak XUL security allows chrome UI spoofing ("phishing" attack)
Summary: net-www/mozilla-firefox - weak XUL security allows chrome UI spoofing ("phish...
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL: http://bugzilla.mozilla.org/show_bug....
Whiteboard: A4 [upstream] koon
Keywords:
Depends on:
Blocks:
 
Reported: 2004-07-30 07:34 UTC by Carsten Lohrke (RETIRED)
Modified: 2011-10-30 22:40 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carsten Lohrke (RETIRED) gentoo-dev 2004-07-30 07:34:47 UTC
faking of whole browser interface possible...
http://www.nd.edu/~jsmith30/xul/test/spoof.html
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2004-07-30 08:08:39 UTC
Neat :)
Waiting for upstream to fix bug
We should probably release a single GLSA with bug 57380.
Comment 2 Carsten Lohrke (RETIRED) gentoo-dev 2004-07-31 04:47:01 UTC
Mozilla is affected, too. Here's the advisory: http://secunia.com/advisories/12188/
Comment 3 Carsten Lohrke (RETIRED) gentoo-dev 2004-08-04 10:12:12 UTC
Mozilla 1.7.2 and Firefox 0.9.3 are released, closing
http://bugzilla.mozilla.org/buglist.cgi?bug_id=251381,249004,250906,253121, which includes a fix for Bug 57380, too.
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2004-08-04 10:36:31 UTC
Using bug 59419 as a metabug.
Comment 5 Aron Griffis (RETIRED) gentoo-dev 2004-08-04 16:58:58 UTC
thunderbird is finished.  mozilla and firefox are still in the works.  In the case of mozilla enough things have changed that it wasn't a simple bump (at least one patch of ours no longer applies).  In the case of firefox it doesn't even build out of the box; they apparently left some files out of the distribution.

Stay tuned...
Comment 6 Aron Griffis (RETIRED) gentoo-dev 2004-08-04 17:04:26 UTC
Sorry, I meant to post that update to bug 59419
Comment 7 Thierry Carrez (RETIRED) gentoo-dev 2004-08-05 04:47:57 UTC
Not sure that the XUL overlay thingy (http://bugzilla.mozilla.org/show_bug.cgi?id=22183) which this bug is about is fixed in 1.7.2 / 0.9.3.
In which case this bug is not linked to the 1.7.2-fixes metabug.
Comment 8 Thierry Carrez (RETIRED) gentoo-dev 2004-08-06 02:36:02 UTC
Confirming, this is still present, at least in Firefox 0.9.3.
This is CAN-2004-0764.

Unlinking from 1.7.2 / 0.9.3 metabug as it is *not* fixed yet.
Comment 9 Carsten Lohrke (RETIRED) gentoo-dev 2004-08-06 02:47:01 UTC
Sorry, somehow implied that this vulnerabilty would be fixed too. :-/
Comment 10 Thierry Carrez (RETIRED) gentoo-dev 2004-09-13 01:31:55 UTC
CondorDes : please follow upstream :
http://bugzilla.mozilla.org/show_bug.cgi?id=22183
and tell us when it lands.
Comment 11 Tom Lynema 2004-09-14 07:21:30 UTC
This bug is at least addressed in the 1.0PR release of firefox.
From the bug report it looks like they are forcing the status bar and putting documentation in firefox.js.

From the firefox.js file:

// Make the status bar reliably present and unaffected by pages

pref("dom.disable_window_open_feature.status", true);

// This is the pref to control the location bar, change this to true to 
// force this instead of or in addition to the statusbar - this makes 
// the origin of popup windows more obvious to avoid spoofing but we 
// cannot do it by default because it affects UE for web applications.

pref("dom.disable_window_open_feature.location", false);
pref("dom.disable_window_status_change",          true);

These prefs should give the user a warning about spoofed sites.  That said, the test site gives me a XML Parsing Error with Firefox 1.0PR, so I can't verify.
Comment 12 Luke Macken (RETIRED) gentoo-dev 2004-10-01 22:04:19 UTC
See bug #66084 and http://www.mozilla.org/press/mozilla-2004-10-01-02.html
Comment 13 Luke Macken (RETIRED) gentoo-dev 2004-10-01 22:10:09 UTC
Erm sorry, that vulnerability has nothing to do with this one.  But, 0.10.1 is released, and mozilla's bug for this issue is still open.
Comment 14 Thierry Carrez (RETIRED) gentoo-dev 2004-11-10 05:28:34 UTC
Bug is still open upstream, so I think it's not in Firefox 1.0
Comment 15 Luke Macken (RETIRED) gentoo-dev 2004-11-26 19:37:20 UTC
The bug is still open upstream, but there are no proof of concepts for firefox 1.0, as it is "much harder to spoof".  I don't see this issue as being a threat anymore... does anyone have any reasons why this bug should stay open?
Comment 16 Thierry Carrez (RETIRED) gentoo-dev 2004-11-27 11:24:09 UTC
I agree that in the current state of affairs, this is hardly a vulnerability and that we could close this.
Comment 17 Luke Macken (RETIRED) gentoo-dev 2004-11-27 19:55:07 UTC
Closing... This issue is hardly a threat anymore, let alone a vulnerability.  If anyone has any good reason to keep this bug open, please do so.. but until then, it's closed.