Closed
Bug 299401
Opened 19 years ago
Closed 18 years ago
Evil People can use Bugzilla to attack Mozilla Developers
Categories
(bugzilla.mozilla.org :: General, defect, P4)
bugzilla.mozilla.org
General
Tracking
()
People
(Reporter: bc, Assigned: justdave)
Details
Through attachments and links, an evil person could use bugzilla to lure a
Mozilla Developer or Community member to execute an attack using an unpatched
vulnerability in the browser. The masking of the attack as a bug report would be
an effective lure.
I don't know of how this might be fixed, but considering the current environment
in the world and on the web it seems to me that it is only a matter of time
before it happens.
Possible approaches to reducing the threat are some "best" practices like
dveditz uses: view-source, java|javascript|flash disabled etc, but it would be
good to be more proactive although we should publish a list of things to do for
safe bugzilla triaging.
One possibility is to use instances of Mozilla|Firefox on each architecture to
act as a canary by loading the links and attachments in a bug. If we could
determine (somehow) that the Mozilla|Firefox instance was attacked we could
quarantine the link|attachment|bug|whatever.
Comment 1•19 years ago
|
||
If we could determine that the browser was under attack we would solve our
security problems once and for all...
Reporter | ||
Comment 2•19 years ago
|
||
(In reply to comment #1)
true, but you missed the point of a canary. It would not detect that an attack
was attempted, but that an attack succeeded by looking for unauthorised file
changes or network connections or some other indicator that the machine had been
compromised.
Comment 3•19 years ago
|
||
I think the correct fix for this problem is to fix the unpatched vulnerability
in the browser! :-)
Given that we now have a large market share, I don't see Bugzilla as a place
attackers would particularly target with their 0day exploit. There are better
ways to get your exploit run on lots of Geckos. How many people view a
particular new bug report? 10 or 20 at most, I'd say.
Gerv
Reporter | ||
Comment 4•19 years ago
|
||
(In reply to comment #3)
> I think the correct fix for this problem is to fix the unpatched vulnerability
> in the browser! :-)
>
Of course the vulnerability should be fixed, I never said otherwise.
> Given that we now have a large market share, I don't see Bugzilla as a place
> attackers would particularly target with their 0day exploit. There are better
> ways to get your exploit run on lots of Geckos. How many people view a
> particular new bug report? 10 or 20 at most, I'd say.
>
Sure, just 10 or 20 of the core Mozilla developers thats all. If you want to
attack 10,000,000 people then bugzilla is not the vector you want. If you _want
to attack Mozilla developers specifically_, then bugzilla is the perfect vector.
If an evil person wishes to disrupt Mozilla development and if they had a 0day
code execution exploit, it would be relatively easy for them to file an exploit
in a bug which wiped the entire disk of the developer viewing the bug and its
links.
Comment 5•19 years ago
|
||
(In reply to comment #4)
> If an evil person wishes to disrupt Mozilla development and if they had a 0day
> code execution exploit, it would be relatively easy for them to file an exploit
> in a bug which wiped the entire disk of the developer viewing the bug and its
> links.
Or more subtle, installs a trojan that steals the private SSH key used for CVS
and then later checks in some innocent-looking exploitable code. Or approves a
rogue extension for UMO.
Updated•19 years ago
|
Group: security → webtools-security
Comment 6•19 years ago
|
||
I think another possible solution in many cases is to run attachments through
ClamAV.
Assignee | ||
Comment 7•19 years ago
|
||
We've been talking for ages about trying to get some sort of plug-in system for
attachment filters (both during upload and for display/interpreting purposes,
such as pretty diffs and htmlizing word docs, or other nifty tricks like that),
but nobody's done it yet.
Reporter | ||
Comment 8•19 years ago
|
||
Georgi has a nice idea in bug 319154 comment 3
Updated•19 years ago
|
Component: Server Operations → Bugzilla: Other b.m.o Issues
QA Contact: myk → justdave
Comment 9•19 years ago
|
||
> another possible solution in many cases is to run attachments through ClamAV.
That won't help in the proposed scenario, no virus checker will have signatures for 0-day exploits pretty much by definition.
> Georgi has a nice idea in bug 319154 comment 3
That's bug 38862
Assignee | ||
Updated•18 years ago
|
Assignee: justdave → justdave
Assignee | ||
Updated•18 years ago
|
Priority: -- → P4
Updated•18 years ago
|
QA Contact: justdave → reed
Comment 10•18 years ago
|
||
(In reply to comment #9)
> That's bug 38862
>
Yeah, this bug is talking about exactly the same issue as in bug 38862. There is no reason to keep both bugs open. And there is much more discussion there.
Status: NEW → RESOLVED
Closed: 18 years ago
Resolution: --- → DUPLICATE
Updated•13 years ago
|
Component: Bugzilla: Other b.m.o Issues → General
Product: mozilla.org → bugzilla.mozilla.org
Updated•11 years ago
|
Group: webtools-security
You need to log in
before you can comment on or make changes to this bug.
Description
•