Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Mozilla Bug Firefox Security Technology

New Firefox iFrame Bug Bypasses URL Protections 118

Trailrunner7 writes "There is a newly discovered vulnerability in Mozilla's flagship Firefox browser that could enable an attacker to trick a user into providing his login credentials for a given site by using an obfuscated URL. In most cases, Firefox will display an alert when a URL has been obfuscated, but by using an iFrame, an attacker can evade this layer of protection, possibly leading to a compromise of the user's sensitive information."
This discussion has been archived. No new comments can be posted.

New Firefox iFrame Bug Bypasses URL Protections

Comments Filter:
  • iFrame? (Score:3, Insightful)

    by plover ( 150551 ) * on Tuesday August 17, 2010 @09:48AM (#33275116) Homepage Journal

    "iFrame"? Seriously? Of all the possible choices of camelCasing you could have picked from, "iFrame" is the only one that describes an Apple video format for the iPhone.

    When referencing the inline frame HTML element, it's a lot clearer to use "iframe", "IFRAME", or even "IFrame".

  • Once again, kids (Score:5, Insightful)

    by Pojut ( 1027544 ) on Tuesday August 17, 2010 @09:53AM (#33275176) Homepage

    Never click on a URL within an email to take you to a website...always go directly to the website yourself.

    Also, use some common sense. You're the 30,000th person today who has been told they are the one millionth visitor...ignore the temptation to smack that bear (or whatever flash ads are doing nowadays)

  • Re:iFrame? (Score:2, Insightful)

    by Neil Boekend ( 1854906 ) on Tuesday August 17, 2010 @10:12AM (#33275392)
    Seriously? Off all the possible names Apple could have chosen from they chose to use a name that also describes an antiquated but still used technique that is abused in attacks?
  • by EMN13 ( 11493 ) on Tuesday August 17, 2010 @10:26AM (#33275536) Homepage

    So - this isn't a bug, and the article is just attention-grabbing. It's a fundamental limitation of links.

  • Re:Oh Please ... (Score:2, Insightful)

    by Bill Hayden ( 649193 ) on Tuesday August 17, 2010 @10:45AM (#33275744) Homepage
    Users are harder to patch though.
  • by eulernet ( 1132389 ) on Tuesday August 17, 2010 @10:47AM (#33275774)

    What ? Slashdot works on a Safari browser ?

  • by Tim C ( 15259 ) on Tuesday August 17, 2010 @10:58AM (#33275916)

    Or relevant, given the flaw is in Firefox.

  • by JustinOpinion ( 1246824 ) on Tuesday August 17, 2010 @11:05AM (#33276000)

    if you don't know what a "good" URL looks like, take the time to educate yourself.

    That is good pragmatic advice. But it points to a fundamental failing in the current architecture.

    It basically means that every person must become proficient in parsing URLs themselves. They have to understand what the "http" means, what the resolution order is (why "facebook.com" is very different from "facebook.com.evil.uk"), to know about fonts (to differentiate ".com" and ".corn" or ".COM" from ".C0M"), to understand what character sets and encodings are (to notice other character substitutions), and to even understand subtleties of character sets (like the unicode "mirror" character... [azarask.in]).

    In other words, it really sounds like we're asking people to do the task that a piece of parsing software should be doing. That's asking quite a lot of the average user. This doesn't mean that there is a simple solution. I certainly don't know what the answer is. But I'm just saying that knowing what a "good" URL looks like is not so simple. I have sympathy for users who get confused. So anything we can do to help them differentiate good from bad is probably a good thing.

  • by Anonymous Coward on Tuesday August 17, 2010 @11:40AM (#33276446)

    http://www.xkcd.com/570/ [xkcd.com]

  • by Anonymous Coward on Tuesday August 17, 2010 @11:51AM (#33276602)

    So - this isn't a bug, and the article is just attention-grabbing. It's a fundamental limitation of links.

    When a URL is obfuscated, Firefox warns you that things might not be what they appear to be. When that obfuscated URL is in an IFRAME, Firefox does not warn you that things might not be what they appear to be. Firefox's intended behaviour is to provide that warning. The intended behaviour does not match the actual behaviour. Therefore, this is a bug in Firefox.

    The overall threat is a fundamental limitation of links. Firefox's attempt to mitigate that threat contains a bug.

"If it ain't broke, don't fix it." - Bert Lantz

Working...