what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

firefoxCross.txt

firefoxCross.txt
Posted Jan 15, 2006

Firefox is susceptible to cross domain scripting attacks via iframes.

tags | advisory
SHA-256 | 6b89d1a712c42d0fa22e8d3c4e52b2435c889ef59a3099d697e6dc33a9ba2ee7

firefoxCross.txt

Change Mirror Download
I reported this to Bugzilla over a year ago (256202) but looks like they don't plan on fixing it....

If a form attempts to post data to a site that is secured by basic auth and the site is outside the current domain, then Firefox dutifully alerts you that an attempt is being made at cross-domain posting.

Example 1:

You are at site www.abc.com and a form attempts to post form data to www.123.com which is secured by basic authorization. Using a URL in the form of username:password@123.com, Firefox alerts you.

However, just drop a hidden IFRAME in the form, set its src to username:password@123.com and Firefox is fooled into thinking that it is not a cross-domain posting. So no warning pops up. You can also drop the U/P on the URL in the forms action since the IFRAME has already logged in.

While there are probably lots of annoying things that can arise from this, one novel exploit came to mind. Since so many users never change the default password for home routers and since routers use basic authentication for logins, you could devise a form that changes router settings of a user and that user is never notified. One could easily create a simple html page that has a form that posts form data to a common IP for home routers using the default U/P. This could be used to turn off the firewall or turn on remote management. Then just log the IP's of visitors and write a script to test if it worked. I tested this on some of the most common routers with Firefox 1.5 and it works like a charm with no notification to the user.

Hopefully, Firefox will fix this now that is has been posted.










Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close