Mozilla announces fix for Firefox protocol handler flaw

Share this article:
Mozilla on Wednesday pushed out a fix for a Firefox vulnerability that could be exploited to steal cookies and session history.

The bug, which affects the chrome protocol handler, was disclosed nearly two weeks ago by researcher Gerry Eisenhaur. He said on his hiredhacker.com blog that attackers could load malicious JavaScript onto a victim's machine, but Mozilla had only considered the possibility a low-risk threat.

On Tuesday, however, Window Snyder, Mozilla's security chief, said on her blog that Mozilla was raising the severity level to “high.” She admitted that hundreds of “flat” plug-ins are at risk. “Flat” add-ons do not store their contents in a JAR archive; therefore, their contents could permit attackers to read random files on the hard drive, according to Mozilla.

“The reason Mozilla bumped this up to high is because I released a PoC [proof of concept] that reads the sessionstore.js file,” Eisenhaur told SCMagazine.com Wednesday via instant messenger. “That exposes the user's current session [windows, history, cookies, etc.] to an attacker.”

He said the sessionstore.js file records open windows and users' histories and cookies.

“I think they didn't realize what data could be stolen, which is why I released the second demo,” Eisenhaur said.

While the issue reportedly was resolved today, Mozilla is not planning to push out a new version of Firefox, v. 2.0.0.12, which will contain the fix, until Tuesday.

But Eisenhaur said he thinks the patch may be flawed.

“I just read through it and I think I can still exploit the attack,” he said. “I am waiting for it to build now so I can verify.”
Share this article:

Sign up to our newsletters

More in News

Brazilian president signs internet 'Bill of Rights' into law

Brazilian president signs internet 'Bill of Rights' into ...

President Dilma Rousseff signed the legislation on Wednesday at the NetMundial conference in Sao Paulo.

Android trojan sends premium SMS messages, targets U.S. users for first time

Android trojan sends premium SMS messages, targets U.S. ...

An SMS trojan for Android, known as FakeInst, has been observed sending premium SMS messages to users all over the world, including, for the first time, the United States.

Report: DDoS up in Q4 2013, vulnerability scanners leveraged to exploit sites

Report: DDoS up in Q4 2013, vulnerability scanners ...

Researchers observed 346 DDoS attacks in the final quarter of 2013 and attackers used Vega and Skipfish vulnerability scanners to exploit web flaws at financial companies.