Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Bug Internet Explorer Mozilla Security The Internet

IE and Firefox Share a Vulnerability 207

hcmtnbiker writes with news of a logic flaw shared by IE 7 and Firefox 2.0. IE 5.01, IE 6, and Firefox 1.5.0.9 are also affected. The flaw was discovered by Michal Zalewski, and is easily demonstrated on IE7 and Firefox. The vulnerability is not platform-specific, but these demonstrations are — they work only on Windows systems. (Microsoft says that IE7 on Vista is not vulnerable.) From the vulnerability description: "In all modern browsers, form fields (used to upload user-specified files to a remote server) enjoy some added protection meant to prevent scripts from arbitrarily choosing local files to be sent, and automatically submitting the form without user knowledge. For example, '.value' parameter cannot be set or changed, and any changes to .type reset the contents of the field... [in this attack] the keyboard input in unrelated locations can be selectively geared toward input fields by the attacker."
This discussion has been archived. No new comments can be posted.

IE and Firefox Share a Vulnerability

Comments Filter:
  • How it works (Score:3, Insightful)

    by Anonymous Coward on Tuesday February 27, 2007 @02:07AM (#18163626)

    Is the way this works by attaching keydown/keyup events to the document object, and then switching focus to the file upload field in order to let the user fill in the upload? Ingenious :)

    So a browser would fix this by not allowing programmatic access to focus() for file uploads?

    It doesn't sound like this would be particularly exploitable because you'd need them to type the letters in the right order (with other arbitrary letters as padding between this). Getting someone to type something might prove easier though now due to the prevalence of Capchas.

  • Re:How it works (Score:5, Insightful)

    by amrust ( 686727 ) <marcrust.gmail@com> on Tuesday February 27, 2007 @02:12AM (#18163678) Homepage

    Getting someone to type something might prove easier though now due to the prevalence of Capchas.


    You took the words right out of my keyboard, no pun intended*.

    It won't affect my commenting on blogs or sites that I normally frequent. But after that demo, I admit I probably won't look at captchas the same way again.

    * OK maybe one quick pun.
  • by Joebert ( 946227 ) on Tuesday February 27, 2007 @03:13AM (#18163912) Homepage
    I tried this on
    Windows XP
    As Administrator
    With No 3rd party anti-virus or anti-spyware protection whatsoever (total of 20 processes running including Opera)
    Opera 9.10
    All scripting enabled
    Checked the presense of boot.ini

    And while it did continue to a new page when I typed the phrase, that new page didn't have the contents of my boot.ini file.
    Just a message telling me what that page was about.
  • by TEMMiNK ( 699173 ) on Tuesday February 27, 2007 @03:21AM (#18163936) Homepage
    the user.
  • Re:IE7 Vista (Score:5, Insightful)

    by brainhum ( 869270 ) on Tuesday February 27, 2007 @03:53AM (#18164024)

    The latest Web 2.0 Captcha:

    C:\ W IN D O W S\ sys tem 32\config\S AM


    You heard it here first! /.

  • by mrbluze ( 1034940 ) on Tuesday February 27, 2007 @04:12AM (#18164090) Journal

    It's certainly romantic, kind of - a bit like a fake pic of Bush and Osama in bed together that was floating around a few years ago.. ewwww!



    Maybe the vulnerability they share is "that they both run in Windows".


  • Re:How it works (Score:3, Insightful)

    by ShieldW0lf ( 601553 ) on Tuesday February 27, 2007 @04:18AM (#18164106) Journal
    The reason focus() exists is to allow you to send the cursor to the field that needs correcting when you're doing form validation. It would suck if it wasn't available.
  • by Anonymous Coward on Tuesday February 27, 2007 @04:33AM (#18164168)
    Hey dumbass! The summary also says:

    "The vulnerability is not platform-specific, but these demonstrations are -- they work only on Windows systems"

    So he took the demos and tried to re-implement them to work on Linux and he couldn't get them to do so.
  • by slashdot.org ( 321932 ) on Tuesday February 27, 2007 @05:25AM (#18164378) Homepage Journal
    I'm not sure why this is getting press now, given that a very similar exploit has been known and public since October 2000 (bug 56236)

    erm, maybe because this is a fairly serious bug that still remains unfixed???
  • by Kopretinka ( 97408 ) on Tuesday February 27, 2007 @06:07AM (#18164616) Homepage

    I'm not sure why this is getting press now, given that a very similar exploit has been known and public since October 2000...
    If it gets press, the fix might finally be released, perhaps?
  • Re:Nope (Score:4, Insightful)

    by TheLink ( 130905 ) on Tuesday February 27, 2007 @06:42AM (#18164792) Journal
    Someone using the exploit can only grab any file on your filesystem that the user account your browser runs as has permissions to read, which may be significantly restricted (I found that hard to do on Linux in the old days, but I guess nowadays it should be easier with better filesystem ACLs).

    If you use the same user account for work, ssh and browsing then you risk exposing stuff like:

    ~/.ssh/id_dsa
    ~/.ssh/id_rsa

    Which in some cases might be more interesting than /etc/fstab ;).

This file will self-destruct in five minutes.

Working...