what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

firefoxCross.txt

firefoxCross.txt
Posted Jan 15, 2006

Firefox is susceptible to cross domain scripting attacks via iframes.

tags | advisory
SHA-256 | 6b89d1a712c42d0fa22e8d3c4e52b2435c889ef59a3099d697e6dc33a9ba2ee7

firefoxCross.txt

Change Mirror Download
I reported this to Bugzilla over a year ago (256202) but looks like they don't plan on fixing it....

If a form attempts to post data to a site that is secured by basic auth and the site is outside the current domain, then Firefox dutifully alerts you that an attempt is being made at cross-domain posting.

Example 1:

You are at site www.abc.com and a form attempts to post form data to www.123.com which is secured by basic authorization. Using a URL in the form of username:password@123.com, Firefox alerts you.

However, just drop a hidden IFRAME in the form, set its src to username:password@123.com and Firefox is fooled into thinking that it is not a cross-domain posting. So no warning pops up. You can also drop the U/P on the URL in the forms action since the IFRAME has already logged in.

While there are probably lots of annoying things that can arise from this, one novel exploit came to mind. Since so many users never change the default password for home routers and since routers use basic authentication for logins, you could devise a form that changes router settings of a user and that user is never notified. One could easily create a simple html page that has a form that posts form data to a common IP for home routers using the default U/P. This could be used to turn off the firewall or turn on remote management. Then just log the IP's of visitors and write a script to test if it worked. I tested this on some of the most common routers with Firefox 1.5 and it works like a charm with no notification to the user.

Hopefully, Firefox will fix this now that is has been posted.










Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    0 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close