[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    Firescrolling [Firefox 1.0]
From:       "mikx" <mikx () mikx ! de>
Date:       2005-02-25 8:10:30
Message-ID: 00c701c51b11$7ab20c10$4a00030a () netvision ! ads
[Download RAW message or body]

__Summary

Remember my Internet Explorer "scrollbar exploit" based on http-equiv's 
"What a Drag"? When will people ever learn that "unusual user interaction" 
can be hidden by common tasks...

Let's combine fireflashing, firetabbing, xul and javascript to run arbitrary 
code by dragging a scrollbar two times.

__Proof-of-Concept

http://www.mikx.de/firescrolling/

__Status

The exploit is based on multiple vulnerabilities:

bugzilla.mozilla.org #280664 (fireflashing)
bugzilla.mozilla.org #280056 (firetabbing)
bugzilla.mozilla.org #281807 (firescrolling)

Upgrade to Firefox 1.0.1 or disable javascript.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has 
assigned the name CAN-2005-0527 to this issue.

__Affected Software

Tested with Firefox 1.0 on Windows and Linux (Fedora Core)

__Contact Informations

Michael Krax <mikx@mikx.de>
http://www.mikx.de/?p=11

mikx

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic