[Full-disclosure] Firefox bookmark cross-domain surfing vulnerability
- From: Michal Zalewski <lcamtuf@xxxxxxxxxxxx>
- Date: Thu, 22 Feb 2007 00:51:19 +0100 (CET)
There is an interesting vulnerability in how Firefox handles bookmarks.
The flaw allows the attacker to steal credentials from commonly used
browser start sites (for Firefox, Google is the seldom changed default;
that means exposure of GMail authentication cookies, etc).
The problem: it is relatively easy to trick a casual user into bookmarking
a window that does not point to any physical location, but rather, is an
code placed therein will execute in the context of a currently visited
webpage. The destination page can then continue to load without the user
The impact of such a vulnerability isn't devastating, but as mentioned
earlier, any attention-grabbing webpage can exploit this to silently
launch attacks against Google, MSN, AOL credentials, etc. In an unlikely
case the victim is browsing local files or special URLs before following a
poisoned bookmark, system compromise is possible.
Thanks to Piotr Szeptynski for bringing up the subject of bookmarks and
inspiring me to dig into this.
Self-explanatory demo page:
This is being tracked as:
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Prev by Date: [Full-disclosure] iDefense Security Advisory 02.16.07: Trend Micro ServerProtect Web Interface Authorization Bypass Vulnerability
- Next by Date: Re: [Full-disclosure] Firefox bookmark cross-domain surfing vulnerability
- Previous by thread: [Full-disclosure] iDefense Security Advisory 02.16.07: Trend Micro ServerProtect Web Interface Authorization Bypass Vulnerability
- Next by thread: Re: [Full-disclosure] Firefox bookmark cross-domain surfing vulnerability