Closed Bug 299401 Opened 19 years ago Closed 18 years ago

Evil People can use Bugzilla to attack Mozilla Developers

Categories

(bugzilla.mozilla.org :: General, defect, P4)

defect

Tracking

()

RESOLVED DUPLICATE of bug 38862

People

(Reporter: bc, Assigned: justdave)

Details

Through attachments and links, an evil person could use bugzilla to lure a Mozilla Developer or Community member to execute an attack using an unpatched vulnerability in the browser. The masking of the attack as a bug report would be an effective lure. I don't know of how this might be fixed, but considering the current environment in the world and on the web it seems to me that it is only a matter of time before it happens. Possible approaches to reducing the threat are some "best" practices like dveditz uses: view-source, java|javascript|flash disabled etc, but it would be good to be more proactive although we should publish a list of things to do for safe bugzilla triaging. One possibility is to use instances of Mozilla|Firefox on each architecture to act as a canary by loading the links and attachments in a bug. If we could determine (somehow) that the Mozilla|Firefox instance was attacked we could quarantine the link|attachment|bug|whatever.
If we could determine that the browser was under attack we would solve our security problems once and for all...
(In reply to comment #1) true, but you missed the point of a canary. It would not detect that an attack was attempted, but that an attack succeeded by looking for unauthorised file changes or network connections or some other indicator that the machine had been compromised.
I think the correct fix for this problem is to fix the unpatched vulnerability in the browser! :-) Given that we now have a large market share, I don't see Bugzilla as a place attackers would particularly target with their 0day exploit. There are better ways to get your exploit run on lots of Geckos. How many people view a particular new bug report? 10 or 20 at most, I'd say. Gerv
(In reply to comment #3) > I think the correct fix for this problem is to fix the unpatched vulnerability > in the browser! :-) > Of course the vulnerability should be fixed, I never said otherwise. > Given that we now have a large market share, I don't see Bugzilla as a place > attackers would particularly target with their 0day exploit. There are better > ways to get your exploit run on lots of Geckos. How many people view a > particular new bug report? 10 or 20 at most, I'd say. > Sure, just 10 or 20 of the core Mozilla developers thats all. If you want to attack 10,000,000 people then bugzilla is not the vector you want. If you _want to attack Mozilla developers specifically_, then bugzilla is the perfect vector. If an evil person wishes to disrupt Mozilla development and if they had a 0day code execution exploit, it would be relatively easy for them to file an exploit in a bug which wiped the entire disk of the developer viewing the bug and its links.
(In reply to comment #4) > If an evil person wishes to disrupt Mozilla development and if they had a 0day > code execution exploit, it would be relatively easy for them to file an exploit > in a bug which wiped the entire disk of the developer viewing the bug and its > links. Or more subtle, installs a trojan that steals the private SSH key used for CVS and then later checks in some innocent-looking exploitable code. Or approves a rogue extension for UMO.
Group: security → webtools-security
I think another possible solution in many cases is to run attachments through ClamAV.
We've been talking for ages about trying to get some sort of plug-in system for attachment filters (both during upload and for display/interpreting purposes, such as pretty diffs and htmlizing word docs, or other nifty tricks like that), but nobody's done it yet.
Georgi has a nice idea in bug 319154 comment 3
Component: Server Operations → Bugzilla: Other b.m.o Issues
QA Contact: myk → justdave
> another possible solution in many cases is to run attachments through ClamAV. That won't help in the proposed scenario, no virus checker will have signatures for 0-day exploits pretty much by definition. > Georgi has a nice idea in bug 319154 comment 3 That's bug 38862
Assignee: justdave → justdave
Priority: -- → P4
QA Contact: justdave → reed
(In reply to comment #9) > That's bug 38862 > Yeah, this bug is talking about exactly the same issue as in bug 38862. There is no reason to keep both bugs open. And there is much more discussion there.
Status: NEW → RESOLVED
Closed: 18 years ago
Resolution: --- → DUPLICATE
Component: Bugzilla: Other b.m.o Issues → General
Product: mozilla.org → bugzilla.mozilla.org
Group: webtools-security
You need to log in before you can comment on or make changes to this bug.