Closed
Bug 1362050
(CVE-2019-9807)
Opened 8 years ago
Closed 6 years ago
FTP allows window modal alert box with attacker controlled input
Categories
(Core :: Networking: FTP, defect, P3)
Core
Networking: FTP
Tracking
()
RESOLVED
FIXED
People
(Reporter: hanno, Assigned: Gijs)
References
(Blocks 1 open bug)
Details
(Keywords: csectype-spoof, sec-low, testcase, Whiteboard: [necko-triaged][adv-main66+])
Attachments
(1 file)
(deleted),
text/html
|
Details |
When one sends garbage over the ftp port 21 and tries to access it via firefox + then tries to reload it will create an alert box with the garbage as content.
I'm attaching a poc. Use it by first starting a dummy "garbage ftp server" on localhost with netcat:
while true; do echo "I can control your popup window content" | nc -l -p 21; done
And then open the html file.
I don't see why this behavior makes any sense. It seems some kind of error handling, however it's missing any explaining error message and just puts all content that came over the ftp port in an alert box. It allows bypassing restrictions of window modal alert boxes, which usually webpages shouldn't be able to control.
Assignee | ||
Comment 1•8 years ago
|
||
(In reply to Hanno Boeck from comment #0)
> It allows bypassing
> restrictions of window modal alert boxes, which usually webpages shouldn't
> be able to control.
What restrictions are you talking about? We still display realm information on http auth dialogs (as do most browsers, I believe), and per-window-modal (rather than tab-modal) dialogs for alert(), prompt() etc. are only a pref flip away (and there are reasons you might want to flip that pref, such as bug 727801).
I'm not convinced there's a realistic security vulnerability here that needs to stay hidden, but I'll leave the decision up to Al & Dan & co.
Also: maybe a dupe of (public) bug 1282430? Hard to tell.
Group: firefox-core-security → core-security
Component: Security → Networking: FTP
Product: Firefox → Core
Comment 2•8 years ago
|
||
This isn't the http auth dialog, it's a 2000-era modal window so it's potentially a bypass of alert-abuse prevention and maybe a bypass on the restrictions against sandboxed frames popping up alerts.
Keywords: csectype-spoof,
sec-low
Updated•8 years ago
|
Group: core-security → network-core-security
Comment 4•7 years ago
|
||
(In reply to Honza Bambas (:mayhemer) from comment #3)
> Can't reproduce with the test case.
Hanno, it seems you missed this comment a month ago.
Can you re-test?
Flags: needinfo?(hanno)
Reporter | ||
Comment 5•7 years ago
|
||
It seems the Javascript reproducer doesn't work very reliable.
However there is a reliable way to reproduce this "manually":
1. Run the nc "fake ftp server":
while true; do echo "I can control your popup window content" | nc -l -p 21; done
2. Call ftp://localhost/
Firefox will try to load it.
3. go into the URL bar and press enter again.
This works always for me. It is probably possible to get a more reliable way in javascript to simulate this. But the main point should be obvious: Firefox sometimes creates alert boxes with random content coming from the server and without any explanation. That surely doesn't seem like correct behavior.
Flags: needinfo?(hanno)
Comment 6•7 years ago
|
||
I could verify the test case reproduces reliably. Back to Honza
Flags: needinfo?(honzab.moz)
Keywords: testcase
Comment 7•7 years ago
|
||
Jason, could you please find an owner? I'm not sure who is responsible for the FTP code these days. Thanks.
Assignee: nobody → jduell.mcbugs
Flags: needinfo?(honzab.moz)
Reporter | ||
Comment 8•7 years ago
|
||
Given that there's no visible activity on fixing this and it's been open several months I intend to disclose this bug within a week.
Updated•7 years ago
|
Priority: -- → P3
Whiteboard: [necko-backlog] → [necko-triaged]
Reporter | ||
Comment 9•7 years ago
|
||
I blogged about this:
https://blog.hboeck.de/archives/891-Some-minor-Security-Quirks-in-Firefox.html
Updated•6 years ago
|
Assignee: jduell.mcbugs → nobody
Assignee | ||
Comment 11•6 years ago
|
||
Someone filed a dupe and there's a public blogpost, should we open this up to increase the chance someone might provide a patch?
Flags: needinfo?(dveditz)
Updated•6 years ago
|
Group: network-core-security
Flags: needinfo?(dveditz)
Assignee | ||
Comment 12•6 years ago
|
||
Fixed in bug 1523249.
Assignee: nobody → gijskruitbosch+bugs
Status: NEW → RESOLVED
Closed: 6 years ago
status-firefox66:
--- → affected
status-firefox67:
--- → fixed
Resolution: --- → FIXED
status-firefox65:
--- → wontfix
Updated•6 years ago
|
Whiteboard: [necko-triaged] → [necko-triaged][adv-main66+]
Updated•6 years ago
|
Alias: CVE-2019-9807
You need to log in
before you can comment on or make changes to this bug.
Description
•