Risk
7/15/2010
12:34 PM
Connect Directly
RSS
E-Mail
50%
50%

Mozilla Disables Firefox Add-On, Recommends Upgrade

The disabled Mozilla Sniffer was intercepting login data and transmitting it to a third-party website; upgrading to the latest version of the CoolPreviews add-on is recommended due to security vulnerability.

The Mozilla Foundation, which maintains the popular Firefox web browser, announced Tuesday that it removed a Firefox add-on called "Mozilla Sniffer" which was intercepting login data and transmitting it to a third-party website. Mozilla also warned of a security escalation vulnerability in the CoolPreviews add-on and recommended that users upgrade immediately to the latest version.

Before its removal, Mozilla Sniffer had been downloaded approximately 1,800 times and had 334 active daily users. Mozilla said that each of them should have now received an uninstall notification. Furthermore, anyone with the add-on currently installed can uninstall it to prevent further passwords from being intercepted. Mozilla also recommended that anyone who has used the tool immediately change all of their passwords.

At the time of the vulnerability announcement, however, Mozilla noted that the website collecting information from Mozilla Sniffer was down, making it unclear whether the threat was still active.

Mozilla Sniffer was a variation on Tamper Data, designed for viewing and modifying HTTP and HTTPS headers and post parameters. Many developers use that add-on for testing web application behavior, to monitor exactly what data gets passed via HTTP, or for penetration testing. Tamper Data, however, doesn't route intercepted data to an external website.

Mozilla also warned that a security escalation vulnerability had been found in version 3.0.1 of the CoolPreviews add-on, which could be exploited via a specially crafted hyperlink. According to Mozilla, "if the user hovers the cursor over this link, the preview function executes remote JavaScript code with local chrome privileges, giving the attacking script control over the host computer."

Proof of concept code for exploiting the vulnerability has been released, though Mozilla said that no malicious exploits have yet been detected. But as of Tuesday, 177,000 users - less than one-quarter of the software's install base - were still running a vulnerable version. Mozilla advised them to install the latest, patched version.

To prevent add-ons such as Tamper Data from gaining distribution, Mozilla is also retooling its code-review policies. Technically, Tamper Data was an experimental add-on, meaning that users had to click through warnings that it hadn't been reviewed and might pose a threat.

As Mozilla noted in its security announcement, "unreviewed add-ons are scanned for known viruses, trojans, and other malware, but some types of malicious behavior can only be detected in a code review."

Accordingly, Mozilla plans to require code reviews for all add-ons before they become publicly available on Mozilla's website.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.