IE and Firefox Share a Vulnerability 207
hcmtnbiker writes with news of a logic flaw shared by IE 7 and Firefox 2.0. IE 5.01, IE 6, and Firefox 1.5.0.9 are also affected. The flaw was discovered by Michal Zalewski, and is easily demonstrated on IE7 and Firefox. The vulnerability is not platform-specific, but these demonstrations are — they work only on Windows systems. (Microsoft says that IE7 on Vista is not vulnerable.) From the vulnerability description: "In all modern browsers, form fields (used to upload user-specified files to a remote server) enjoy some added protection meant to prevent scripts from arbitrarily choosing local files to be sent, and automatically submitting the form without user knowledge. For example, '.value' parameter cannot be set or changed, and any changes to .type reset the contents of the field... [in this attack] the keyboard input in unrelated locations can be selectively geared toward input fields by the attacker."
Awww, that's so cute (Score:5, Funny)
Re: (Score:3, Insightful)
It's certainly romantic, kind of - a bit like a fake pic of Bush and Osama in bed together that was floating around a few years ago.. ewwww!
Maybe the vulnerability they share is "that they both run in Windows".
Re: (Score:3, Informative)
Save the windows bashing for actual causes.
Re: (Score:2)
That's mostly right, actually (Score:2, Informative)
Even on better-designed OSs, though, the exploit has uses for espionage and spam. People tend to put data files in predictable
Re: (Score:3, Funny)
Re: (Score:2)
Read more: http://msdn2.microsoft.com/en-us/library/ms972827
Re: (Score:2, Troll)
For shame! What's that directory [wikipedia.org] doing on a computer at Microsoft Security Engineering?
Nope (Score:4, Informative)
Neither on 2.0.2 xpsp1 (Score:2)
Yep I have a boot.ini (Score:2)
Re: (Score:2)
yeah didn't work for me either on Firefox 2.0.0.2, XP SP2, logged in as admin. The text popped up saying "you should see your boot.ini file below. If you don't... maybe I screwed something up." and nothing was below it and I do have a boot.ini file on the c: root
Re:Nope (Score:5, Interesting)
I'm not too worried about it, because in my office I use Linux and I run WinXP in a virtual machine, in that VM I use a nonadmin account for normal stuff - viewing and priting Word or Excel docs, instant messaging, AND I use the Run As feature to launch browser windows as yet another different nonadmin account. On the Linux host itself, I run firefox as a different user from my main user account.
So if I gather correctly, you can grab my bookmarks or downloaded files, IF I actually type all the letters to those specific paths? That's it?
I'd be more worried about Windows graphic driver exploits - graphics drivers seem a bit shoddy- plus they are all about performance, not security. And currently it's basically - Nvidia, ATI and Intel.
I've had weird things happen with Linux sound though so I wonder about the security of such stuff. I've pretty much given up on getting Linux sound to work properly for sustained periods of time (this on suse 10.0, perhaps I should try 10.2).
Re: (Score:2)
If I'm reading this right, yes, with the added limitation that Firefox won't budge without a fully qualified path name, so you'd have to type a stream of characters that included a few backslashes.
If I'm reading this right, you could combine it with some exploit that breaks the same-origin policy and steal text typed in elsewhere, but then if you've broken the sa
Re: (Score:2, Interesting)
So now that this is a bug, it makes Gmail an exploit, which makes Google do evil.
Boycott Google, Hail Microsoft!
Re: (Score:2)
and it would be nice for mozilla to confirm "silent submit" with file inputs
i was wondering on the same issue a few days ago, how can they protect this from happening, right now, they can't
Re: (Score:2)
Ok then, can anyone name a file on my XP box that has a standard name that they could use a copy to do some damage with?
Then I'll make an evil JavaScript version of typing tutor...
Oh, and if were comparing notes I'm surfing as an administrator in XP using firefox, and my sound does work. And I disabled the ability to transfer money out of my account using my online banking.
Re: (Score:2)
Naq vs lbh znxr gur glcvat ghgbe ebg13 rirelguvat gur fhpx^U^U^U^Uhfre unf gb glcr, lbh'er nyy frg...
Re: (Score:2)
No, someone using this exploit could grab any file on your filesystem that you have permissions to read. Interesting targets would be e.g.
Common mistake made here: most of these exploits are pretty harmless by themselves
Re:Nope (Score:4, Insightful)
If you use the same user account for work, ssh and browsing then you risk exposing stuff like:
~/.ssh/id_dsa
~/.ssh/id_rsa
Which in some cases might be more interesting than
Re: (Score:2)
Re: (Score:3, Informative)
Other than getting a full list of user names on my system, what does the /etc/passwd file contain that I don't want others to know? It's not like passwords are stored in there or anything...
Re: (Score:2)
In virtually all modern linux-systems, nothing really sensitive is stored in /etc/passwd, all the good stuff is in /etc/shadow (which is only readable by root). This is called shadowing. And by the way, you never store a password, you only store a salted hash of it.
Run the command "cat /etc/shadow" and then run "sudo cat /etc/shadow" and watch the difference. So, unless you are running firefox as root (why, oh why, are you running firefox as root?!?!?!?) you'll be pretty safe.
Re: (Score:2)
I know all that, which is why I said that I don't know why I would fear exposing my /etc/passwd file.
Because I miss my good old days of running Windows with IE?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Oh, yes, with shadowing enabled (and who doesn't enable it?) they're going to have real fun with my /etc/passwd.
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
Well, that is true... OTOH, first they'd have to see which daemons are running (in my case, none, since I don't have any servers).
Then they'd have to hope that the brute force attempts aren't discovered in time or the forced accounts automatically disabled after a certain number of attempts and that the attempts themselves aren't logged.
All in all, that's quite a lot of hope.
One of my computers has a guest account: login is username, password is password.
There you go, attack it. Knock yourself out.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
*Doh*
I wonder how many other /.ers tried it, like I did and couldn't get it to work because they forgot to turn off NoScript...
How it works (Score:3, Insightful)
Is the way this works by attaching keydown/keyup events to the document object, and then switching focus to the file upload field in order to let the user fill in the upload? Ingenious :)
So a browser would fix this by not allowing programmatic access to focus() for file uploads?
It doesn't sound like this would be particularly exploitable because you'd need them to type the letters in the right order (with other arbitrary letters as padding between this). Getting someone to type something might prove easier though now due to the prevalence of Capchas.
Re:How it works (Score:5, Insightful)
You took the words right out of my keyboard, no pun intended*.
It won't affect my commenting on blogs or sites that I normally frequent. But after that demo, I admit I probably won't look at captchas the same way again.
* OK maybe one quick pun.
Re: (Score:2)
This is true, but say you put it on a website where people type a lot into a text box - such as a forum, or web mail, or ... AAAH! SLASHDOT!
It turns out that some percentage of users will probably type the correct string just by chance (hence the reason why the sample page used that silly expression about cheese).
Another way they could trick you into typing the letters in the correct or
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
Of course a very simple work around to avoid the possibility of being exploited in such a manner is to type all posts in a
The real common vulnerability... (Score:3, Funny)
For good or ill, I don't know many regular users, of course it is lonely at times...
Re: (Score:2)
Re: (Score:2)
Doesn't work with Firefox 2.0.0.1 on Windows XP (Score:4, Informative)
Also, there is no need to type all that jibberish about cheese. Just slowly type in:
C:\boot.ini
Type it too quick, and the javascript in the background won't be able to keep up with the rate of keystrokes you enter.
Re: (Score:2)
It worked for me (yikes!) with 2.0.0.2 on Windows 2003; I presume XP would be similar.
Re: (Score:2, Informative)
Re: (Score:2)
Re: (Score:2)
False. These are the defaults on XPSP2 and Win2003:
It works for anybody >= Power Users.
Then I tried with an administrator user, and still boot.ini wasn't shown.
It works for Administrators too.
Fud?
No
Re: (Score:2)
Also, there is no need to type all that jibberish about cheese
The gibberish is there to demonstrate pulling selected key presses out of the string that you type in. Getting someone to type a path to a file would be tricky; pulling a path out of a reasonably long message would be much, much easier (although getting enough slashes would seem to be unlikely...)
Vulnerability doesn't work on Vista (Sort of) (Score:2, Interesting)
I had to create a Boot.ini file in my C: drive since Vista doesn't have it there anymore. IE7 and Firefox will be able to pull information out of the file if you have permissions to read the file but if you don't it won't work. This is probably why some people are reporting it doesn't work in Win XP with a user account. Only admin accounts are affected because the user
Re: (Score:2)
Often when somebody prints out a document to distribute at a meeting they print the full path to the document in the footer of every page. This has always seemed like a bad idea to me.
OT: CS:101 - Lost updates. (Score:3, Informative)
Managing documents is not a task to be taken lightly, especially when the document is the product of more than one person, document management systems work in essentially the same way as source control systems. The reason the file is on the footer is to deliberately identify where the document came from (ie: is it "offici
Re: (Score:2)
Maybe you want the meta information, or the letterhead, embedded macros or a later version.
Try as I might... (Score:2, Interesting)
Re: (Score:2)
Re: (Score:3, Informative)
I think the presence of a C:\ might help.
Sand boxing ? (Score:2)
Works on FireFox under Linux (Score:5, Interesting)
http://www.thanhngan.org/fflinuxversion.html [thanhngan.org]
Linux code (Score:2)
- The key pressing timing is absolutely critical. Too slow or too fast and everything breaks. Appart from a captcha, I don't see what input would have the correct pace not to go noticed. The exploit can't just stay around waiting while users type the needed keys in a chat windows, because the keypress pace won't be optimal and both the exploit will get out-of sync and won't capture the output it needs, and the chat window is
Sad realization (Score:2, Funny)
Anyone else try Opera ? (Score:3, Insightful)
Windows XP
As Administrator
With No 3rd party anti-virus or anti-spyware protection whatsoever (total of 20 processes running including Opera)
Opera 9.10
All scripting enabled
Checked the presense of boot.ini
And while it did continue to a new page when I typed the phrase, that new page didn't have the contents of my boot.ini file.
Just a message telling me what that page was about.
Re: (Score:2, Interesting)
Re: (Score:2)
When I try the Firefox version, it just won't go on to the following page at all. Then I tried it in IE7 and Firefox to see what
They already share a vulnarability... (Score:2, Insightful)
Requires javascript (Score:3, Informative)
New/unknown sites won't be able to do this, but my previously "trusted" ones will.
Variation on an old bug (Score:5, Informative)
Zalewski's version is bug 370092, and he was unhappy when I marked it as a duplicate of bug 56236.
Re: (Score:2, Insightful)
erm, maybe because this is a fairly serious bug that still remains unfixed???
Re: (Score:3, Insightful)
What about Konqueror? Or Safari? Or Opera? (Score:4, Interesting)
The vulnerability is called 'users' (Score:2)
And the workaround is... (Score:2)
I thought this was fixed ? (Score:2)
The Reg [theregister.co.uk] carried this story yesterday. I don't know if IE7 is fixed yet, but I had an auto update to Firefox (2.0.0.2), 3 days ago.
it's a POC (Score:2)
It's a proof of concept about a focus redirect exploit (bug? that's a misnomar). The example itself (displaying boot.ini) is not the exploit, the exploit is the hijacking of selective typed text in one textbox and applying it to another. The application of this exploit could be much differ
NoScript stops it (Score:2)
Wrap it up! (Score:2)
Re: (Score:2)
IE7, Firefox2, Opera9, Konqueror and Safari (Score:2)
IP violation (Score:2, Funny)
Re: (Score:2)
With all these FireFox vulnerabilities... (Score:2)
Re: (Score:2)
Re: (Score:2)
0. "seems to have" doesn't sound very scientific proof.
1. Each security bug in Firefox is revealed and count as one, in IE not all are revealed (mostly only if they are public already) and often several have been counted as one by Microsoft. And most like Microsoft is not the only one. Opera didn't reveal the security bug it fixed untill a long time after the version had been relea
wtf? (Score:2)
The real problem lies in that it is there, just not visible in the browser.
I can accept that. The key is style="position: absolute; left: -500px;...
And then the div tag's style: style="position: absolute; left: 510px;... that takes the form and puts it back to pop
Then the dev closes the div tag and places the file field to the left.
Clever. But there is some security in obscurity. Knowing which files to grab that ar
I think it's really sweet (Score:2)
I've used it for years! (Score:2)
I don't really see how this is an "exploit," since it seems to require user intervention. But in any case, I've been doing this using VBA with IE to automatically fill out file upload fields - for years.
I know, I should have used Curl or something back then, but it was Access VBA. Don't blame me!
The real "fix," though, would be to remove the text box entirely and just have a browse button.
Re: (Score:2, Interesting)
If so then it's still vulnerable because they'll release a patch to stop hackers from uploading user files, like those with predictable filenames. It seems wrong to say that IE+Vista aren't vulnerable when the IE bug still exists.
(of course if IE7 prevents giving focus to the upload field then I'm wrong -- but I don't think that
Re: (Score:2)
From what TFA says though, protected mode protects IE on Vista.
Re:IE7 Vista (Score:5, Informative)
Re:IE7 Vista (Score:5, Insightful)
The latest Web 2.0 Captcha:
C:\ W IN D O W S\ sys tem 32\config\S AMYou heard it here first!
Re: (Score:2, Funny)
Re: (Score:2)
It could be worse. (Score:2)
Re: (Score:2)
Re:Offtopic rant (Score:5, Informative)
Seeing this in tech news just shows how much this has spread. I no longer want to use the word enjoy at all because every time I hear it, I am reminded of this usage and feel a twinge of annoyance.
I want my English language back from these idiots!
You'll have to go a long way back to claim this one.
Re: (Score:2)
Main Entry: anthropomorphize
Function: verb
Inflected Form(s): -phized; -phizing
transitive verb : to attribute human form or personality to
intransitive verb : to attribute human form or personality to things not human
Re: (Score:2)
The point is that no anthropomorphisation is taking place in sentences like "the house enjoys views across the river" or whatever, because "enjoy" doesn't only refer to the human emotion, but has additional meanings also, which have existed for nearly 6 centuries. They may have been anthropomorphic then; they aren't any more.
Re: (Score:2)
You have to realize how ridiculous these people are. They babble for a living.
I must warn you that I have heard marketing people talking about their "Spider Sense tingling" and needing to "ping" colleagues for information.
"Your language" has been and always will be hostage to idiots. If you want to feel more secure, I suggest that you change your language from English to C. The C compiler is much stricter.
Re: (Score:2)
This is patently false. This conversation is very nice, so I'm going to go and play a gay game, get a cool drink, watch a counterfeit video and get some truly bad snack food.
Re: (Score:2)