Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 58709 - net-www/firefox: Certificate Spoofing
Summary: net-www/firefox: Certificate Spoofing
Status: RESOLVED DUPLICATE of bug 57380
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL: http://seclists.org/lists/bugtraq/200...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2004-07-28 16:32 UTC by Dan Margolis (RETIRED)
Modified: 2011-10-30 22:39 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Dan Margolis (RETIRED) gentoo-dev 2004-07-28 16:32:16 UTC
It looks like there is a certificate spoofing problem in Firefox that allows a website to appear to have a valid SSL cert from another site. This appears to be distinct from Bug 57380. 

The following is from bugtraq (a followup poster claims to confirm vulnerability on Linux):

#########################################
Application: Mozilla Firefox
Vendors: http://www.mozilla.com
Version: 0.9.1 / 0.9.2
Platforms: Windows
Bug: Certificate Spoofing (Phishing)
Risk: High
Exploitation: Remote with browser
Date: 25 July 2004
Author: Emmanouel Kellinis
e-mail: me_at_cipher(dot)org(dot)uk
web: http://www.cipher.org.uk
List : BugTraq(SecurityFocus)/ Full-Disclosure
#########################################

=======
Product
=======
A popular Web browser,good alternative of IE and
"The web browser" for linux machines,
used to view pages on the World Wide Web.

===
Bug
===

Firefox has caching problem, as a result of that someone can
spoof a certificate of any website and use it as his/her own.
The problem is exploited using onunload inside < body> and
redirection using Http-equiv Refresh metatag,document.write()
and document.close()

First you direct the redirection metatag to the website
of which you want to spoof the certificate, then inside
the < body> tag you add onulnoad script so you can control
the output inside the webpage with the spoofed certificate.

After that you say to firefox, as soon as you unload this page
close the stream, aparently the stream you close is
the redirection website, you do that with
document.close().

Now you can write anything you want , you do that
using document.write(). After writing the content of you choice
you close the stream again , usually firefox wont display your content,
although if you check the source code you see it , so the last thing
is to refresh the new page (do that using window.location.reload()),
after that you have your domain name in the url field , your content
in the browser and the magic yellow Lock on the bottom left corner,
if you pass your mouse over it you will see displayed the name of
the website you spoofed the certificate, if you double click on it you
will check full information of the certificate without any warning !

You dont need to have SSL in your website ! it will work with
http.

Additional using this bug malicious websites can bypass content
filtering using SSL properties.

=====================
Proof Of Concept Code
=====================

< HTML>
< HEAD>
< TITLE>Spoofer< /TITLE>
< META HTTP-EQUIV="REFRESH" CONTENT="0;URL=https://www.example.com">
< /HEAD>
< BODY
onunload="
document.close();
document.writeln('< body onload=document.close();break;>
            < h3>It is Great to Use example's Cert!');

document.close();
window.location.reload();
">
< /body>



Reproducible: Always
Steps to Reproduce:
Comment 1 Dan Margolis (RETIRED) gentoo-dev 2004-07-28 16:48:02 UTC
Oops. This is also fixed in the patch cited for Bug 57380.

*** This bug has been marked as a duplicate of 57380 ***