Hijacking Firefox Via Insecure Add-Ons 87
An anonymous reader writes "Many makers of extensions or add-ons for Firefox are introducing ways for bad guys to hijack the Web browser, new research suggests. A great many add-ons are updated over insecure (non https://) connections, providing an avenue for attackers to replace the extension with an evil update. Google's add-ons are particularly vulnerable, because they update automatically without notifying the user. From the story: '[I]f an attacker were to hijack a public Wi-Fi hot spot at a coffeehouse or bookstore — a fairly trivial attack given the myriad free, point-and-click hacking tools available today — he could also intercept this update process and replace a Firefox add-on with a malicious one.'" Here is security researcher Chris Soghoian's description of the vulnerability and a video of a simulated takeover.
Re: (Score:2, Funny)
fud? (Score:4, Interesting)
Re: (Score:2, Informative)
The problem aabou the use of HTTP for updates is that mozilla.org takes weeks to update the release on their addon website (simpy plugin, for example, was affected by this: the 0.3 release took more than 2 weeks to appear on addons.mozilla.org). Otis, the simpy admin, told me about this while I wrote
Re:fud? (Score:4, Interesting)
But using HTTPS wouldn't solve this problem either, because Verisign will sell a certificate to anyone with money. What should be happening is that developers sign their packages like they do for DEB and RPM package distros. That way you always know that you're getting your updates from the same person, no matter what your internet connection.
Re:fud? (Score:5, Insightful)
Alternately, the Mozilla team could create their own signing certificate and add it to Firefox's whitelist; add-on developers could then get Mozilla-signed certificates for themselves. That would at least narrow the list a bit -- as you say, anyone can get a Verisign certificate, in part because there are just so many possible uses for one, but there should be few enough official Mozilla-signed add-on certificates to allow for some proper screening.
The certificates could also be used for authentication of the updates themselves, as you suggested.
Re:fud? (Score:4, Informative)
If it's just extension updates anyway, and extensions already act as a part of Firefox (i.e. they're not sandboxed... which they can't be in the current architecture)... They might as well just require SSL for updates, and people who don't use the Mozilla update service can just ship their own (self-signed) cert with the extension. Of course, some authors will still work around that by doing their own thing anyway. (There were, at one point, very, very insecure extensions that... load the whole toolbar at runtime using eval() by pulling data from unsecured sites.)
Re: (Score:2)
I don't really see how this would be any more time- or reputation-intensive than granting accounts on the official Mozilla add-on site; it would simply be another step in the account-creation process. It might even help with
Re: (Score:2)
A certificate won't guarantee quality, it's just supposed to guarantee that we can hunt down the person to whom it was issued. Verisign doesn't offer that unless you get to thei
Re: (Score:3, Insightful)
I would rather each developer create their own self-signed certificate, then I get to decide who to trust, not Verisign.
You need to read up on what the ssl certs are for. They are not for trust, they are for verification. Any dork can create an ssl cert and say he's John "Maddog" Hall, but to get a VERIFIED certificate from a issuing agency saying you're indeed John "Maddog" Hall requires a LOT of verification of identity.
If you choose to trust an un-verified cert, then you are right back in the same boat as TFA is talking about.
Re: (Score:2)
I would rather trust a cert verified by me, than one verified by VeriSign.
Verisign? Self signed certs? Not again! (Score:2)
I can't blame plugin developers, a self signed certificate alert really looks more evil than unsigned code.
That Verisign/Symbian signed crap is _the_ reason why Commwarrior type of Symbian tr
Re:fud? (Score:5, Insightful)
Another point is how this affects the Google Gears project that was in a previous post. Now you have cross platform hackability for an application that could potentially host your critical apps.
Re: (Score:3, Interesting)
That would be the big difference here between firefox and explorer.
The real problem is when website authors make network dependencies with this kind of crap and scorn open standards. While many firefox extensions are nifty they are entirely optional. This is in stark contrast to the current trend in requiring flash or other plugins for every stupid little thing.
Quicktime buttons are another fun one.
Don't trust public nets. (Score:5, Insightful)
Re:Don't trust public nets. (Score:5, Informative)
You mean like the Google Toolbar for IE and about a bazillion other ActiveX applets?
This problem is not Firefox-specific.
However, it's important to note that Firefox does not allow updates from untrusted sources by default. It comes configured with updates allowed only from addons.mozilla.org and updates.mozilla.org.
Furthermore, for those of you with notebooks/WiFi -- for God's sake, turn off Automatically check for Updates to: Firefox, Installed Add-Ons and Search Engines from the 'Updates' tab in the 'Advanced' options, especially if you're going to be spending time in a coffee bar. And before you say: "Well, that's in the Advanced section and we shouldn't expect normal people to have to edit those options" I say horsepuckey. If you're bright enough to be using Firefox instead of IE, you should be bright enough to know how to configure it in a secure manner.
Re: (Score:2)
Right, so I've just taken over your connection to the coffeehouse access point, and your DNS lookup now shows that addons.mozilla.org is at 192.168.1.254. Alternately, I route its real IP (63.245.209.31) to the laptop I've done the takeover with, where I've got a copy of addons.mozilla.org's content - except with evil updates.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
If you think you have to be 'bright' or computer literate to use Firefox, you're nuts. There are people who think that blue 'e' is the Internet and there are people who can hack the kernel. But there's a whole continuum of people in between who know how to install a program, but know nothing about security (and yes, that's a huge problem) and never touch
Re: (Score:2)
Updates to Firefox itself are safe even over WiFi. Updates to extensions you got from addons.mozilla.org are also safe. Turning off automatic updates will make you less secure, not more.
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
No, this is not true. If you've installed an add-on from a non-default site, it can still update in exactly the same way as an AMO approved add-on. I know this because I make Fx extensions.
Re: (Score:2)
Re: (Score:1)
Is this a firefox issue? (Score:1)
No shit! (Score:1, Informative)
We can prevent attacks like this easily.
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Remember, Firefox is supposed to fill the same role as IE - It's not just for geeks, the "masses" are invited to use it as well. These are the same masses that Slashdotters claim don't know the difference between Windows and the Interwaeb. Thus, this issue needs to be addressed in the design and code of FF in a was that the so-called masses can handle.
Re: (Score:1)
don't automatically update (Score:2, Interesting)
Forced automatic update is evil (Score:2, Redundant)
Then again these days Firefox itself pretty much forces you to update if you want to easily install extensions. What is with forcing people to download the plugins at install time? Last time I checked there was a plugin that allowed you to download to install later. That makes no sense. Why do I need a plugin to do this???
I use to have a stable browser with 1.0. With 1.5 and 2.0 I often have to restart the thing if I open lots of tabs and some of the page
Re: (Score:1, Informative)
Welcome to the wonderful world of Bloatware (Score:3, Interesting)
You derided Opera's minuscule userbase.
You vied for the top dog spot.
Well, now you're on your way to getting there. You're gaining markt share. With growing market share come the demands of progressively dumber users - it's just the nature of the technology market. FF's code needs a good clean-up.
Re: (Score:2)
I've never heard it expressed so succinctly (and without cussing).
Beautiful.
Re: (Score:2)
What about Craig Thomas?
Addons from addons.mozilla.org not vulnerable (Score:5, Informative)
Since it's not mentioned in the summary, it's important to reiterate that this takes advantage of non-secure update mechanisms used by some addons. The addons.mozilla.org site will only host extensions that update from addons.mozilla.org through the built-in mechanism, which is not vulnerable to this attack. This is an extension-specific issue, and would most likely apply to any sort of addon for any software that doesn't verify security certificates.
Plug-in's are people too (Score:2)
Maybe if you spent more time with your plug-in's they wouldn't feel that way. Have some compassion!
Re: (Score:1)
Is it viable? (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
This topic is kind of like the Linux virus stories that appear every few months: it's just anti-free-software FUD.
Firefox extensions are insecure (Score:3, Interesting)
Yes, one should be careful about the extensions, and use them carefully. And one should be careful about using WiFi in coffee shops and hotels. I am far more worried about our salesmen plugging in their lap top in some hotel network in Bangkok, pick up an infection and coming to corporate HQ and plug that laptop in our intranet, behind the firewall, in the trusted network. I have asked my sysadmin to set up a separate network for laptops that might be used outside our intranet that is not part of the trusted intra net.
Re: (Score:3, Funny)
Re: (Score:1)
You are wrong (Score:2)
Ask him to take a look on 802.1x http://standards.ieee.org/getieee802/download/802 [ieee.org]. 1X-2004.pdf. You can give access to different VLAN based on software policies (i.e. having AV updated and so on)
You obviously confused some things:
EEE 802.1X is an IEEE standard for port-based Network Access Control; it is part of the IEEE 802 (802.1) group of protocols. It provides authentication to devices attached to a LAN port, establishing a point-to-point connection or preventing access from that port if authentication fails.
You might want to read the documents you refer to. I guess, what you meant was NAC - Network Admission Control [cisco.com]
Gaa...read the article if you have no clue at all (Score:3, Informative)
OK, so it's about the "extensions provided by Firefox"? No, it's explicitly about extensions not provided by firefox but strapped on by some mechanism devised by the extension's developer, be it Google, Yahoo, whomever.
Extensions provided by Firefox are downloaded via a secure connection - it's your Google-toolbar that comes unprotected.
So, if you don't have a clue, read the article. If you still hav
Re: (Score:3, Interesting)
Uh... not true at all. Firefox extensions can contain (and run) executable code.
As the Greasemokey security vulnerability [oreillynet.com] demonstrated, web pages can "script" Firefox extensions.
ActiveX = executable code + scripting from the web browser. Firefox extensions introduce the same risks as ActiveX.
(addons.mozilla.org is having problems right now, otherwise I'
Re: (Score:2)
Ah, good. addons.mozilla.org seems to be responding again.
So check out FoxyTunes [mozilla.org], which is listed on the Recommended Add-ons [mozilla.org] page.
Download the XPI file, rename it to ZIP. Open it in WinZip or whatever. You'll notice several files:
DLL files are executable code on Windows. I'm assuming the *.linux and *.mac are similar. SO files are executable code under Linux, not sure why it has .file after it.
I'm sure there are more
Sign your addons, please.. (Score:5, Informative)
It's not hard (for anyone who can make an add-on).
Stupid (Score:1)
Subject to the laws of physics (Score:3, Insightful)
That means that this attack only works if the local area network is hijacked! Which reduces its danger substantially for the population at large as the huge majority of home connections is on its own link.
It is only a problem in the situation above (that are atypical nowadays) and in work or other large-network settings where it is possible to connect an untrusted computer to the network.
IT ALSO MEANS IT IS NOT FIREFOX SPECIFIC, as hijacking a connection can lead to many unpleasant things that may be as dangerous as that without requiring Firefox (ie grabbing passwords!).
As the user goes, so goes the browser (Score:1)
Re: (Score:2)
This is crypto 101 (Score:1, Redundant)
HTTPS isn't necessarily secure.. (Score:2)
HTTP versus HTTPS is _not_ the problem (Score:2)
Back in my day ... (Score:2)
Everyone's websurfing saviour firefox is just as vulnerable it seems
I think this big warped shift in people's perception happened about the time when all those pesky Javascript haters (all slashdot readers just a couple years ago) fell in love with Ajax
Relation (Score:1)
Doesn't the same apply for Windows Updates? A hijacked DNS can return a false address of a windows pdate server and have the user download vulns. instead of patches.