Open
Bug 1146911
Opened 10 years ago
Updated 2 years ago
Malicious files are successfully downloaded through a download area using SSL enabled protocol.
Categories
(Firefox :: Downloads Panel, defect)
Tracking
()
NEW
People
(Reporter: VarCat, Unassigned)
References
Details
Attachments
(1 file)
(deleted),
image/png
|
Details |
FF 38
Build id: 20150323004010
OS: Win 7 x64, Ubuntu 14.04 x86, Mac Os X 10.7.5
STR:
1. Go to http://www.eicar.org/85-0-Download.html
2. Download eicar.com from "Download area using the secure, SSL enabled protocol https" section (eg: https://secure.eicar.org/eicar.com)
Issue:
The file is successfully downloaded without being blocked.
Comment 1•10 years ago
|
||
Monica, do you know if the integrity check is bypassed for SSL downloads?
Flags: needinfo?(mmc)
Comment 2•10 years ago
|
||
Flags: needinfo?(mmc)
Comment 3•10 years ago
|
||
No, it is not skipped for SSL downloads. Francois is asking Google to put that download on their blocklist. Note that Chrome seems to be showing the POTENTIALLY_UNWANTED warning which we don't yet implement, but could now that the quarantine is implemented (see https://bugzilla.mozilla.org/show_bug.cgi?id=1019933).
Flags: needinfo?(francois)
Comment 4•10 years ago
|
||
Also related is that we don't currently do remote metadata lookups for Mac and Linux: https://bugzilla.mozilla.org/show_bug.cgi?id=1111741
Updated•10 years ago
|
Flags: needinfo?(francois)
Updated•2 years ago
|
Severity: normal → S3
You need to log in
before you can comment on or make changes to this bug.
Description
•