Closed Bug 1138808 (CVE-2015-4494) Opened 10 years ago Closed 10 years ago

Permission bypass for Wifi direct system messages

Categories

(Firefox OS Graveyard :: Wifi, defect)

x86
macOS
defect
Not set
normal

Tracking

(b2g-v1.4 wontfix, b2g-v2.0 fixed, b2g-v2.0M fixed, b2g-v2.1 fixed, b2g-v2.1S fixed, b2g-v2.2 fixed, b2g-master fixed)

RESOLVED FIXED
2.2 S7 (6mar)
Tracking Status
b2g-v1.4 --- wontfix
b2g-v2.0 --- fixed
b2g-v2.0M --- fixed
b2g-v2.1 --- fixed
b2g-v2.1S --- fixed
b2g-v2.2 --- fixed
b2g-master --- fixed

People

(Reporter: pauljt, Assigned: fabrice)

References

Details

(Keywords: sec-moderate, Whiteboard: [b2g-adv-main2.2+])

Attachments

(1 file)

I'm not sure when WifiDirect was enabled but there appears to be no permission checks on the system messages:

https://dxr.mozilla.org/mozilla-central/source/dom/messages/SystemMessagePermissionsChecker.jsm#127

Unless I'm mistaken, that means any app could listen for these system messages, which is probably a privacy issue? It is documented as requiring the "wifi-manage" permission, but this is not how it is implemented. Marking as secure just in case, but its publicly documented so not sure how useful that is.

If this is actually an oversight, then this is probably a blocking bug, so marking 2.2?

The sec-rating is a guess, im not sure of the actually implication here, it may not actually be too bad.
I think you're right, since we broadcast these system messages (see http://mxr.mozilla.org/mozilla-central/ident?i=PAIRING_REQUEST_SYS_MSG).
Attached patch wifi-p2p.patch (deleted) — Splinter Review
Assignee: nobody → fabrice
Attachment #8572057 - Flags: review?(vchang)
Comment on attachment 8572057 [details] [diff] [review]
wifi-p2p.patch

Review of attachment 8572057 [details] [diff] [review]:
-----------------------------------------------------------------

Thanks for jumping to this.
Attachment #8572057 - Flags: review?(vchang) → review+
https://hg.mozilla.org/integration/b2g-inbound/rev/07d9bcf2c1c1
https://hg.mozilla.org/mozilla-central/rev/07d9bcf2c1c1
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Target Milestone: --- → 2.2 S7 (6mar)
Do we need to consider backporting this to any older releases?
Flags: needinfo?(fabrice)
(In reply to Ryan VanderMeulen [:RyanVM UTC-5] from comment #6)
> Do we need to consider backporting this to any older releases?

Would be good, yes. a=me for all branches down to 2.0
Flags: needinfo?(fabrice)
CCing bkerensa since he is release managing for ESR and wasn't able to see this.
We don't ship that code in desktop builds.
Group: core-security
Group: b2g-core-security
Whiteboard: [b2g-adv-main2.2+]
Alias: CVE-2015-4494
Summary: Wifi direct system messages don't require a permission → Permission bypass for Wifi direct system messages
Group: core-security → core-security-release
Group: core-security-release
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: