IE and Firefox Share a Vulnerability 207
hcmtnbiker writes with news of a logic flaw shared by IE 7 and Firefox 2.0. IE 5.01, IE 6, and Firefox 1.5.0.9 are also affected. The flaw was discovered by Michal Zalewski, and is easily demonstrated on IE7 and Firefox. The vulnerability is not platform-specific, but these demonstrations are — they work only on Windows systems. (Microsoft says that IE7 on Vista is not vulnerable.) From the vulnerability description: "In all modern browsers, form fields (used to upload user-specified files to a remote server) enjoy some added protection meant to prevent scripts from arbitrarily choosing local files to be sent, and automatically submitting the form without user knowledge. For example, '.value' parameter cannot be set or changed, and any changes to .type reset the contents of the field... [in this attack] the keyboard input in unrelated locations can be selectively geared toward input fields by the attacker."
How it works (Score:3, Insightful)
Is the way this works by attaching keydown/keyup events to the document object, and then switching focus to the file upload field in order to let the user fill in the upload? Ingenious :)
So a browser would fix this by not allowing programmatic access to focus() for file uploads?
It doesn't sound like this would be particularly exploitable because you'd need them to type the letters in the right order (with other arbitrary letters as padding between this). Getting someone to type something might prove easier though now due to the prevalence of Capchas.
Re:How it works (Score:5, Insightful)
You took the words right out of my keyboard, no pun intended*.
It won't affect my commenting on blogs or sites that I normally frequent. But after that demo, I admit I probably won't look at captchas the same way again.
* OK maybe one quick pun.
Anyone else try Opera ? (Score:3, Insightful)
Windows XP
As Administrator
With No 3rd party anti-virus or anti-spyware protection whatsoever (total of 20 processes running including Opera)
Opera 9.10
All scripting enabled
Checked the presense of boot.ini
And while it did continue to a new page when I typed the phrase, that new page didn't have the contents of my boot.ini file.
Just a message telling me what that page was about.
They already share a vulnarability... (Score:2, Insightful)
Re:IE7 Vista (Score:5, Insightful)
The latest Web 2.0 Captcha:
C:\ W IN D O W S\ sys tem 32\config\S AMYou heard it here first!
Re:Awww, that's so cute (Score:3, Insightful)
It's certainly romantic, kind of - a bit like a fake pic of Bush and Osama in bed together that was floating around a few years ago.. ewwww!
Maybe the vulnerability they share is "that they both run in Windows".
Re:How it works (Score:3, Insightful)
Re:Try as I might... (Score:1, Insightful)
"The vulnerability is not platform-specific, but these demonstrations are -- they work only on Windows systems"
So he took the demos and tried to re-implement them to work on Linux and he couldn't get them to do so.
Re:Variation on an old bug (Score:2, Insightful)
erm, maybe because this is a fairly serious bug that still remains unfixed???
Re:Variation on an old bug (Score:3, Insightful)
Re:Nope (Score:4, Insightful)
If you use the same user account for work, ssh and browsing then you risk exposing stuff like:
~/.ssh/id_dsa
~/.ssh/id_rsa
Which in some cases might be more interesting than