Hijacking Firefox Via Insecure Add-Ons 87
An anonymous reader writes "Many makers of extensions or add-ons for Firefox are introducing ways for bad guys to hijack the Web browser, new research suggests. A great many add-ons are updated over insecure (non https://) connections, providing an avenue for attackers to replace the extension with an evil update. Google's add-ons are particularly vulnerable, because they update automatically without notifying the user. From the story: '[I]f an attacker were to hijack a public Wi-Fi hot spot at a coffeehouse or bookstore — a fairly trivial attack given the myriad free, point-and-click hacking tools available today — he could also intercept this update process and replace a Firefox add-on with a malicious one.'" Here is security researcher Chris Soghoian's description of the vulnerability and a video of a simulated takeover.
No shit! (Score:1, Informative)
We can prevent attacks like this easily.
Re:fud? (Score:2, Informative)
The problem aabou the use of HTTP for updates is that mozilla.org takes weeks to update the release on their addon website (simpy plugin, for example, was affected by this: the 0.3 release took more than 2 weeks to appear on addons.mozilla.org). Otis, the simpy admin, told me about this while I wrote to him telling that 0.3 was released on the author's website and I suggested to update the simpy page about FF extension.
On the other side, few developers can afford a ssl certificate, so that's why most updates happens over http (and not on mozilla servers)
pieggi
google toolbar (Score:0, Informative)
http://www.channelregister.co.uk/2006/07/20/googl
Re:Don't trust public nets. (Score:5, Informative)
You mean like the Google Toolbar for IE and about a bazillion other ActiveX applets?
This problem is not Firefox-specific.
However, it's important to note that Firefox does not allow updates from untrusted sources by default. It comes configured with updates allowed only from addons.mozilla.org and updates.mozilla.org.
Furthermore, for those of you with notebooks/WiFi -- for God's sake, turn off Automatically check for Updates to: Firefox, Installed Add-Ons and Search Engines from the 'Updates' tab in the 'Advanced' options, especially if you're going to be spending time in a coffee bar. And before you say: "Well, that's in the Advanced section and we shouldn't expect normal people to have to edit those options" I say horsepuckey. If you're bright enough to be using Firefox instead of IE, you should be bright enough to know how to configure it in a secure manner.
Addons from addons.mozilla.org not vulnerable (Score:5, Informative)
Since it's not mentioned in the summary, it's important to reiterate that this takes advantage of non-secure update mechanisms used by some addons. The addons.mozilla.org site will only host extensions that update from addons.mozilla.org through the built-in mechanism, which is not vulnerable to this attack. This is an extension-specific issue, and would most likely apply to any sort of addon for any software that doesn't verify security certificates.
Re:Forced automatic update is evil (Score:1, Informative)
Sign your addons, please.. (Score:5, Informative)
It's not hard (for anyone who can make an add-on).
Re:fud? (Score:4, Informative)
If it's just extension updates anyway, and extensions already act as a part of Firefox (i.e. they're not sandboxed... which they can't be in the current architecture)... They might as well just require SSL for updates, and people who don't use the Mozilla update service can just ship their own (self-signed) cert with the extension. Of course, some authors will still work around that by doing their own thing anyway. (There were, at one point, very, very insecure extensions that... load the whole toolbar at runtime using eval() by pulling data from unsecured sites.)
Gaa...read the article if you have no clue at all (Score:3, Informative)
OK, so it's about the "extensions provided by Firefox"? No, it's explicitly about extensions not provided by firefox but strapped on by some mechanism devised by the extension's developer, be it Google, Yahoo, whomever.
Extensions provided by Firefox are downloaded via a secure connection - it's your Google-toolbar that comes unprotected.
So, if you don't have a clue, read the article. If you still have any doubt that you fully understand it, don't comment on it.