Closed Bug 978471 Opened 11 years ago Closed 10 years ago

HTTP Auth dialog for malicious subresource can be used for phishing

Categories

(Core :: DOM: Navigation, defect)

27 Branch
x86_64
Windows 7
defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 647010

People

(Reporter: whitepentester, Unassigned)

References

(Depends on 1 open bug)

Details

(Keywords: csectype-spoof, sec-moderate)

Attachments

(3 files)

Attached file detailed_video.7z (deleted) —
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:27.0) Gecko/20100101 Firefox/27.0 (Beta/Release) Build ID: 20140212131424 Steps to reproduce: More info in video. I have created file requiring HTTP Basic Authorization then posted in other site reference to this file via "src" HTML attribute. Actual results: On TARGET site attacked users have seen Firefox's popup demanding username and password (HTTP Authentication popup). TARGET site was rendering HTTP Authentication popup from another, malicious domain. Expected results: Firefox should not allow to render HTTP Authentication popup from external servers/websites. If you would have any questions you can find me at whitepentester@gazeta.pl Best regards
Attached file this one without pass sorry 5_2.7z (deleted) —
Attachment #8384182 - Attachment description: this one without no pass sorry 5_2.7z → this one without pass sorry 5_2.7z
Attached image screen_shot.png (deleted) —
I've reviewed the video and tried it myself. The authentication dialog appears, and the correct domain (attacker.com) appears in the message text. The issue, it appears, is that the message conveyed by the response header "WWW-Authenticate: Basic realm" can easily convey a message or URL that could be confused as coming from the victim's site. I imagine that we could (and should) highlight the text used to render the actual domain just to downplay any conflicting message that could be sent in this response header. I don't know if - in general - dialogs for HTTP authorization should be allowed on subresources within web pages, but I'd bet dveditz knows.
Status: UNCONFIRMED → NEW
Ever confirmed: true
s/authorization/authentication
Jesse, have you filed anything similar to this?
Flags: needinfo?(jruderman)
Fixing bug 647010 is the best way to fix this. We could also try to differentiate (or hide?) the attacker-supplied message, as Matt suggests, but there's a limit to how effective that can be in this inherently confusing situation.
Flags: needinfo?(jruderman)
Summary: New type of phishing attack → HTTP Auth dialog for malicious subresource can be used for phishing
We can fix bug 647010, right? ;)
Flags: firefox-backlog+
Component: Untriaged → Document Navigation
Depends on: 647010
Product: Firefox → Core
FIXED by fixing bug 647010 :)
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
What about reward guys? :) Best regards, J.
(In reply to whitepentester from comment #9) > What about reward guys? :) Please mail the security address as described in the process section of https://www.mozilla.org/en-US/security/bug-bounty/#Process
Flags: sec-bounty?
I don't see how this isn't a dupe of bug 647010, and it wasn't even a new or unknown problem when that was reported in 2011. In 2008 Zalewski's Browser Security Handbook already had text describing this problem, and his Handbook was not revealing new attacks but collecting the scattered browser security insights of the time. "Amusingly, its ghost still haunts modern web applications: HTTP authentication prompts often come up in browsers when viewing trusted pages where a minor authentication-requiring sub-resource, such as <IMG>, is included from a rogue site - but these prompts usually do a poor job of clearly explaining who is asking for the credentials. This poses a phishing risk for services, such as blogs or discussion forums, that allow users to embed external content." https://code.google.com/p/browsersec/source/browse/wiki/Part3.wiki?spec=svn98&r=98
Group: core-security
Resolution: FIXED → DUPLICATE
Flags: sec-bounty? → sec-bounty-
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: