Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Saturday August 08 2015, @02:44AM   Printer-friendly
from the no-bloatware-goes-unpunished dept.

Mozilla Firefox's PDF Reader has a vulnerability that can "violate the same origin policy and inject script into a non-privileged part of the built-in PDF Viewer. This would allow an attacker to read and steal sensitive local files on the victim's computer."

Mozilla Security Blog has further details:

Yesterday morning, August 5, a Firefox user informed us that an advertisement on a news site in Russia was serving a Firefox exploit that searched for sensitive files and uploaded them to a server that appears to be in Ukraine. This morning Mozilla released security updates that fix the vulnerability. All Firefox users are urged to update to Firefox 39.0.3. The fix has also been shipped in Firefox ESR 38.1.1.

The vulnerability comes from the interaction of the mechanism that enforces JavaScript context separation (the "same origin policy") and Firefox's PDF Viewer. Mozilla products that don't contain the PDF Viewer, such as Firefox for Android, are not vulnerable. The vulnerability does not enable the execution of arbitrary code but the exploit was able to inject a JavaScript payload into the local file context. This allowed it to search for and upload potentially sensitive local files.

The files it was looking for were surprisingly developer focused for an exploit launched on a general audience news site, though of course we don't know where else the malicious ad might have been deployed. On Windows the exploit looked for subversion, s3browser, and Filezilla configurations files, .purple and Psi+ account information, and site configuration files from eight different popular FTP clients. On Linux the exploit goes after the usual global configuration files like /etc/passwd, and then in all the user directories it can access it looks for .bash_history, .mysql_history, .pgsql_history, .ssh configuration files and keys, configuration files for remina, Filezilla, and Psi+, text files with "pass" and "access" in the names, and any shell scripts. Mac users are not targeted by this particular exploit but would not be immune should someone create a different payload.

The exploit leaves no trace it has been run on the local machine. If you use Firefox on Windows or Linux it would be prudent to change any passwords and keys found in the above-mentioned files if you use the associated programs. People who use ad-blocking software may have been protected from this exploit depending on the software and specific filters being used.

Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by PinkyGigglebrain on Saturday August 08 2015, @10:58AM

    by PinkyGigglebrain (4458) on Saturday August 08 2015, @10:58AM (#219846)

    This is the kind of bloated crap half ass insecure programing I expect to hear about relating to an Adobe or Microsoft program,

    An embedded pdf reader? I seem to recall that Firefox was supposed to be a BROWSER, and only a browser.

    <sarcasm>What will Mozilla add next? I know! An email client! And maybe a html editor/publishing tool too!
    </sarcasm>I've been hearing good things about Palemoon, guess its time to switch over.

    pardon the rant. Its way past my bed time. And I mean WAY past. I really should know better than to fire up Minecraft after 9pm by now. Though the sunrise is very pretty this morning :)

    --
    "Beware those who would deny you Knowledge, For in their hearts they dream themselves your Master."
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2