Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Sunday August 18 2019, @10:33AM   Printer-friendly
from the I've-always-used-********** dept.

Mozilla patched a vulnerability in the Firefox web browser with the launch of the 68.0.2 release which would allow unauthorized users to copy passwords from the browser's built-in Save Logins database even when protected with a master password.

"Stored passwords in 'Saved Logins' can be copied without master password entry" according to Mozilla security advisory, which also rates the security flaw tracked as CVE-2019-11733 as having a 'moderate' impact.

The flaw allows anyone with local access to a computer running an unpatched version of Firefox to go to the Save Logins dialog available in Firefox's Options > Privacy & Security preferences menu and copy the password stored for any of the saved logins by right-clicking and choosing the "Copy Password" option.

"When a master password is set, it is required to be entered before stored passwords can be accessed in the 'Saved Logins' dialog," says Mozilla.

"It was found that locally stored passwords can be copied to the clipboard through the 'copy password' context menu item without first entering the master password, allowing for potential theft of stored passwords."

Mozilla Firefox Bug Let Third-Parties Access Saved Passwords


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by maxwell demon on Sunday August 18 2019, @02:56PM

    by maxwell demon (1608) on Sunday August 18 2019, @02:56PM (#881752) Journal

    Of course, once you install a malicious plugin, it's also game over. But a web site shouldn't be able to do that.

    The "uncloseable" window is easy: Just attach JavaScript on the "onclose" event. The URL bar OTOH sounds like something that shouldn't work for a web site (a plugin of course totally can do that). But maybe it was that you weren't actually at the URL bar (did you use the keyboard to get there? The keyboard event could have been caught and the switch to the URL bar prevented). Or of course it might have had nothing to do with the URL bar itself, and instead just monitored the attempt to leave the site using the onunload event (but then, it should not have triggered as soon as you enter something in the URL bar, but only when you press Enter there).

    And of course I wouldn't completely exclude a vulnerability that allows you to read out a password. But it would not be this vulnerability. Instead, I would expect such a vulnerability to exploit the password auto fill-in; maybe by silently loading the login page into an invisible iframe, and then after the browser auto-fills it, reading the data from there.

    --
    The Tao of math: The numbers you can count are not the real numbers.
    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3