Mozilla UI Spoofing Vulnerability 583
Short Circuit writes "Secunia has issued a security advisory for Mozilla and Firefox. Apparently, remote web sites can spoof the user interface using XUL. (See the Firefox proof of concept.) Of course, that won't stop me from using Firefox."
This is nothing... (Score:3, Funny)
Well my friend, my IE can beat your browser many times over!
HA!
Re:This is nothing... (Score:3, Interesting)
Re:This is nothing... (Score:5, Informative)
Re:This is nothing... (Score:3, Insightful)
Rat never thought this thru. I think his trying to gain attention over something which he never bothered contemplating that there was no possible solution an
Re:This is nothing... (Score:3)
Of course it is. It doesn't stop being an issue just because it can be done in other ways as well. It doesn't stop being an issue because it can't be fixed (more like the opposite in that case).
If they fix it this way, blackhats use javascript..
Maybe, but Javascript won't do a nearly as good job as XUL itself to make pretty much a 100% identical version of the interface that's interactive and all.
Re:This is nothing... (Score:4, Interesting)
Re:This is nothing... (Score:3, Insightful)
Re:This is nothing... (Score:5, Interesting)
Oh, and there's no excuse for "security through obscurity", especially when you've spent the past five years ridiculing the evil empire for it and thumping your chest singing the praises of being open and honest about the same thing. I don't care if this particular issue is interpreted as a bug, a vuln, a feature or anything else. The Mozilla folks kept this jewel mum for five years as far as I can tell. You know what? That means that XUL is probably flawed in some fundamental way and they know it. And if that's not the case, the fact that they hid it sure makes it seem that way.
I suspect we're going to start seeing many more of these as Mozilla gains a foothold. Perhaps all our retarded zealot fanboys will being the understand that actual vulnerabilities aside (which affect all code), plain user stupidity and the fundamental problems of the browser as an application platform make up for a large percentage of the perceived problems with IE. Heck, the other day I rain into a page that wanted me to install some XPI malware.
Maybe we're not so superior after all when people actually use what we do. Reality intrudes on the best laid plans, I guess.
what? (Score:5, Insightful)
I've never heard anyone say it was MS's fault that people can make a convincing fake browser interface to fool people. Hell, all of slashdot has discussed this type of thing before, with the old ads some companies made to look like popup dialog boxes. Those fooled a lot of people, but I've never heard anyone say it was MS's fault.
But there's a very simple solution, and I can explain it in one sentence.
Never let anything, popup windows, javascript, etc., hide any part of the browser interface.
That's it. 100% solution to the "fake browser interface" problem. In fact, Firefox already has that partly covered, "Allow scripts to: [*] Hide the status bar" => "Allow scripts to: [ ] Hide the status bar". That setting should default to unchecked, and it shouldn't be user-modifiable. On my system, I immediately saw a double status-bar. But that's not enough, the menu bar and browser controls shouldn't be hidable either.
Re:what? (Score:3, Informative)
Re:what? (Score:3, Insightful)
Exactly...I don't know why javascript even allows popup windows, or altering the browser interface. The browser should contain a save, self-contained viewport on the world wide web. Anything that a webpage does should *only* occur within the viewport.
Re:what? (Score:3, Interesting)
He played a prank on another colleague that involved making the desktop background a centered image of a windows error message - one of those serious looking "illegal exception" things if I recall correctly.
Naturally when the victim clicks on the OK or Cancel it doesn't work. Then the victim actually got rather worried...
My colleague got pretty worried when I installed the bluescreen screen saver on his PC as an april fool's joke.
I dunno about y
Re:This is nothing... (Score:5, Interesting)
Re:This is nothing... (Score:3, Insightful)
> it's pretty obvious actually.
So how do these experts have any idea what will affect the end user? From their non-javascript Ivory Tower, they survey the scene and see all is good. meanwhile, Joe Dickwad sends his credit card info to the Ukraine, thinking he's just bought his momma a bouquet for mothers' day.
To secure the end user's experience, you need to experience things from an end-user perspective.
[this comment is nitpicking the post, not the
Not another one! (Score:5, Funny)
Re:Not another one! (Score:2, Interesting)
Does this make the point less valid? The open-source community seems to react quickly to criticism like this, so my guess is there will be a fix quickly.
Re:Not another one! (Score:3, Interesting)
Re:Not another one! (Score:3, Funny)
It's not that big a deal really (Score:5, Informative)
Heck, you don't even need to install any extensions...just customize your toolbar a little...place ANY icon after the help menu and try the proof of concept...it doesn't work - the difference is too obvious.
Neat trick, definitely, but I don't see it as much more.
I'm using Firefox... (Score:5, Funny)
Re:I'm using Firefox... (Score:5, Funny)
Use shit.slashdot.org :) (Score:5, Informative)
Re:Use shit.slashdot.org :) (Score:3, Informative)
Re:I'm using Firefox... (Score:5, Funny)
Re:I'm using Firefox... (Score:2, Funny)
Re:I'm using Firefox... (Score:3, Funny)
Re:I'm using Firefox... (Score:5, Funny)
for the next 3 months every problem was probably caused by "spoofing"...he drove us nuts with that bullshit.
so to fuck with him, we created fake security/vulnerability reports about a new threat: "goof balling"
we could barely keep from wetting our pants as he ran around for the next 3 months telling everyone "we are being goof balled"
Vulnerability? (Score:3, Interesting)
Re:Vulnerability? (Score:3, Informative)
Having said that, I'll stick to Firefox nonetheless - let's just hope the Firefox team will find a way to fix it soon.
Re:Vulnerability? (Score:2)
Re:Vulnerability? (Score:3, Insightful)
Re:Vulnerability? (Score:5, Insightful)
Re:Vulnerability? (Score:3, Insightful)
Re:Vulnerability? (Score:3, Interesting)
Re:Vulnerability? (Score:5, Insightful)
As a sidepoint, I think the actual vunerability is the fact that XUL can be effectively imported and utilised from a website, rather than a vunerability saying "you can spoof the xyz browser using http user-agent flags and jpeg images" as a bad example
Re:Vulnerability? (Score:5, Insightful)
Exactly - furthermore, you can easily do exactly the same with IE. You just create a new window, with the fullsize property set, then set the dimensions (so you then have a blank window with no chrome at all - not even a title bar) - after that it's simply a matter of adding your spoofed interface using DHTML... Game over.
Re:Vulnerability? (Score:3, Funny)
Re:Vulnerability? (Score:5, Informative)
This hasn't worked since Internet Explorer 6.0SP1. You can no longer resize a fullscreen window.
As of 6.0SP2 (due out soon, hopefully) you can no longer create a window without a statusbar.
Moreover, it is difficult to "fake out" the UI using DHTML. You may be able to fool inexperienced users, but it is much harder than doing the same thing using Mozilla's XUL.
Marked confidential? (Score:5, Interesting)
Re:Marked confidential? (Score:3, Informative)
That said, five years is a long time.
Re:Marked confidential? (Score:5, Interesting)
And aren't a thousand eyes suppose to be looking at the code and fixing it? So shouldn't the fix come quickly? Isn't that the strength of OpenSource? If in theory it sounds good but in reality it doesn't work, what good is it to have a thousand eyes looking at the code for security purposes?
Re:Marked confidential? (Score:4, Insightful)
Re:Marked confidential? (Score:3, Insightful)
I'm
Re:Marked confidential? (Score:3, Interesting)
whoops (Score:4, Interesting)
Gotta love that security-by-obscurity...
Confidential bugs in open source projects (Score:2, Insightful)
I use Opera (Score:3, Insightful)
No pointless XUL, no reimplemented widgets, no cute little XPI spoofs. Just a native web browser that is the fastest and leanest out there.
It's interesting to watch the conflicts of posters today. On one hand, they want to keep using Firefox and supporting it. On the other hand, they k
Re:I use Opera (Score:3, Informative)
* "Window handling" defaults to "Prefer pages inside windows", so when a site tries to open a new window, it gets an MDI child window. This isn't nice for web applications or users who don't like tabbed browsing, but it is more secure against spoofing.
* At least in the default theme, if I do javascript:window.open("", "", "scrollbars=no"); void 0, the content area is indented by
What the hell? (Score:4, Insightful)
What kind of blind OSS zealotry is this? If somebody said something similar of IE there would be a unanimous uproar of upbraids from the slashdot community against whoever said it.
Is it somehow tolerable for OS software to have faults, even serious ones? Security through obscurity is no security at all, as I'm sure many Firefox users will learn one day. Personally, I believe statements like that, and the people that make them are what is holding OSS back from becoming a serious contender to the juggernauts of mocrosoft. If we continue to sit on laurels gained only through lucky ineptitude we will get precicely nowhere.
PS seems like google has started another round of gmail invites, I just got six. Logged in users tell me your funniest joke involving tux the linux penguin and the six funniest will recieve an invite (use a throwaway account, I'm sure this post will be followed by cowardly un-obfuscating trolls).
Re:What the hell? (Score:5, Funny)
And from the linked page, a gem that we shouldn't overlook:
"if you don't have Firefox (you should get it!)"
Re:What the hell? (Score:2, Insightful)
This is why I use Windows, which is more secure because hackers can't search the code for vulnerabilities to exploit.
</stupidity>
But it does make me glad I have both installed on all computers. It is ironic tho, with all the MS bashing, and this is actually a more serious exploit the last few IE exploits. Firefox doesn't have the quantity of bugs that IE has, but it makes up for it with the quality I guess.
As for me, I'm gonna start surfing in a shell with Lynx.
Re:What the hell? (Score:5, Interesting)
there is nothing it is not doing like it should
it may be stupid to allow javascript to hide the toolbars etc.
maybe it would be wise to disable those features in the next firefox version per default
it is easy to change right now...
and i don't see why this is worse than IE permitting execution of code on your machine
Re:What the hell? (Score:2, Interesting)
Re:What the hell? (Score:3, Insightful)
> IE there would be a unanimous uproar of upbraids from the slashdot community
> against whoever said it.
Who cares what the `slashdot community` says? There's a mixture of people here. You don't have to listen to everyone. I'm not a zealot and i'm going to be sticking with Firefox, as I don't believe i'm at risk of this particular exploit, as I have a local webpage on my hard drive which is just a list of URLs to sites
Re:What the hell? (Score:2)
Re:What the hell? (Score:4, Insightful)
Re:What the hell? (Score:3, Funny)
There are many, many people out there who continue to use IE, even after knowing there are alternatives and that IE has many security holes. So what? Why doesn't anybody label those people as "MS zealots"?
They do. You apparently missed the memo...
Re:What the hell? (Score:5, Insightful)
What kind of blind OSS zealotry is this?
You know, I never advocate using Mozilla/Firefox due to lack of vulnerabilities; because deep down inside, I know there are a ton of vulnerabilities just waiting to be found. This is a problem for any reasonably complex software. Two reasons to use Mozilla/Firefox:
1. Feature-wise, it completely blows away IE
2. Standards compliant, which will help make the web a better place for all browsers
Also, it runs on many OS's, but that's not a good reason for everyone.
Currently, most of the malware/viruses/etc are for IE. But I have seen sites that try to get you to install Mozilla extensions that could be potentially malicious. With Mozilla's new-found popularity, it's only a matter of time before Mozilla gets attention from the malware writers. Get ready for it.
Re:What the hell? (Score:3)
Re:What the hell? (Score:5, Informative)
...
If a person, or group, can't be mature enough to admit a big, "oops, I/we made a really big design mistake. We'll fix it because many people are depending on us," then that person or group has no business working on such a fundamentally important piece of software as a web browser.
A workable solution to this kind of problem has been around for many years. Java applets, when run from appletviewer, display a very prominent notice telling the user that very thing.
The sad this about all this is that it's not even a fundamental design problem. Firefox has configuration options to eliminate this problem:
All you need to do is put something like this in your user.js file:
Firefox, huh ? (Score:4, Funny)
Re:Firefox, huh ? (Score:3, Funny)
Doesnt do tabs (Score:3, Interesting)
Re:Doesnt do tabs (Score:3, Insightful)
Double standards? (Score:5, Insightful)
If this was an issue with IE and not Firefox, I hope you'd still be saying the same thing?
However I suspect that you'd be denigrating IE as loudly as possible, while insisting that everyone should move immediately to Firefox.
Re:Double standards? (Score:4, Insightful)
a) If you use anything Microsoft, you're an idiot.
b) If you use anything Linux, you're a maniac.
Sort of like slow-driver/fast-driver syndrome.
Bear in mind... (Score:5, Informative)
It also fails to appear properly on the Macintosh.
If someone wanted to make some kind of exploit with this, they'd want to target a specific platform and Firefox revision. (eg. 0.9 on Windows) Since Firefox is in constant development, it could well change between revisions and render these spoofs obsolete.
I don't really see this as a Firefox vulnerability. Use any browser without a popup blocker, and you'll see a lot of popup ads pretending to be legitimate OS windows and dialogs. This is really just a variation of that.
Re:Bear in mind... (Score:3, Insightful)
Sure, if a toolbar suddenly looks like the default config all users will suspect a faked UI and get alerted instantly... you expect too much. IMHO many will simply assume the browser messed up their config and keep on browsing. Even if the majority gets suspicious, the small percentage that is fooled is most likely to be profitabl
Not sure how they'll fix this... (Score:3, Informative)
At any rate this can be overcome quite easily by changing the javascript prefs so that sites can't hide things like the status bar and menus.
Javascript window "features" (Score:5, Informative)
Why does the browser even allow Javascript to create popup windows without toolbars, menu bars and status bars? This has to be one of the most annoying features of any web browser, I can't for the life of me understand why anyone would think up or need such a feature.
Without this Javascript, you couldn't turn the real menubars and toolbars off, and the problem would be much less severe since although you'd have a second set of interface controls within the browser window, the real status bar would be at the bottom, and the real menubar would be at the top.
Firefox already has a way to block JS from doing this and using several other of its most annoying features, and indeed I personally have these limits switched on already. Put about:config in the address bar, and change these entires to the following values (or look up how to make a user.js file on Google):
dom.disable_window_move_resize = true
dom.disable_window_open_feature.close = true
dom.disable_window_open_feature.directories = true
dom.disable_window_open_feature.location = true
dom.disable_window_open_feature.menubar = true
dom.disable_window_open_feature.minimizable = true
dom.disable_window_open_feature.personalbar = true
dom.disable_window_open_feature.resizable = true
dom.disable_window_open_feature.scrollbars = true
dom.disable_window_open_feature.status = true
dom.disable_window_open_feature.titlebar = true
dom.disable_window_open_feature.toolbar = true
dom.disable_window_status_change = true
Now try the example given in the summary again [nd.edu].
Re:Javascript window "features" (Score:3, Informative)
Situation is web interface to a database. Popup windows are used to search database and fill in parts of the main form (product search, customer search, etc).
It saves a lot of screen real estate turning off those unnecessary things--and it's helpful for the user to have both the main form as well as any search windows open at the same time.
Re:Javascript window "features" (Score:3, Informative)
Bullshit. As far as I know, Mosaic 1.0 had basic forms. Coupled with a cgi script, Mosaic was a DB front-end from the beginning. On top of that, Mozilla is, of course, the direct descendent of Netscape, which was designed by Marc Andressen, the original developer of Mosaic. Andressen stated repeatedly that he wanted to make Netscape a platform rather then just a browser, so your point is quite thouroughly shot to hell.
But ev
XP SP2 does this (Score:4, Interesting)
Also, Internet Explorer with Windows XP SP2 will prevent websites from creating pop-up windows without a status bar, or with the status bar positioned off screen. Microsoft has recognized that the status bar should always be visible, I think the Mozilla/Firefox team should follow suit.
http://www.microsoft.com/technet/prodtechnol/wi
Re:Javascript window "features" (Score:3, Insightful)
This feature is useful:
1) Whenever you have to show the user some information that is not directly related to the task at hand. Example: you have a multi-page "wizard" style form allowing a user to enter information into a database. It is a
There's something rotten in Firefox. (Score:5, Insightful)
(1).The problem was known 4 years ago, but it was marked confidential. I'm not familiar with BugZilla,so I didn't even know there could be a "confidential" bug. This is the antithesis of Open Source philosophy. This is pure security-through-obscurity, in pure M$ style. If the bug wasn't "confidential",I'm sure we should have seen this fixed years ago.
I just hope most of the other open source/free software projects I rely on every day (Linux,KDE,Mplayer,Kile,Thunderbird,Nicotine and so on...) don't follow such a moron habit.
(2)How can the browser load XUL code and use it without warning? This is not a bug: this looks more like IE-like flawed design. Correct design shouldn't even *read* any data of this kind, let alone running it and let it deface the browser itself!
The Mozilla family of browsers/mail clients is still a crew of wonderful programs,and I'm proud of using them. But they will rapidly become IE-like crap, if they continue this way.
Re:There's something rotten in Firefox. (Score:4, Interesting)
I mean, it's basically the same as using images to spoof the IE toolbars, Firefox just gives you the tools to do a better job of it.
The only thing I can think of that wouldn't make using XUL a total pita is to warn the users first time a site trys to use it, something like
"Do you want this site to create an interface in XUL (phishing warning blah blah blah).
[Yes] [No] [x] remember this for xyz.com
Re:There's something rotten in Firefox. (Score:4, Insightful)
If you want to view your web applications internally using XUL, having a whitelist akin to the popup blocker seems the best way (don't bother user unless he figures out something is missing and he clicks on the disabled-window icon). For all us people just wanting to browse some HTML, automatically (or even after prompting) running XUL from a remote server is a flaw and potentially dangerous, and should be considered as such. I'm amazed this hasn't received more attention.
Re:There's something rotten in Firefox. (Score:4, Insightful)
I fully agree this is a very bad idea. All it takes is someone to get hacked, or in another way disclosing information about these secret bugs, and then they might start circulating among "underground" hackers without us knowing it, and voila we have an exploit for an issue a very large group of the developers didn't even know exist.
If they did know, they could of course have offered help in resolving the bug much earlier.
They need to start thinking about these things now as the browser might start to gain momentum. Even if it's not huge problems revealed, merely the fact that secret bugs exists and are revealed now and then (I have no doubt we'll see more in the future since this is probably not the only one), is severe negative publicity for the Mozilla products. It wouldn't be nearly as bad if the bugs weren't secret.
Too much zealotry (Score:4, Interesting)
Re:Too much zealotry (Score:3, Insightful)
As for ActiveX, that's actually running code on your computer, XUL is just an interface language. You can't run XUL that'll install spyware on your machine for example.
That's it... (Score:2, Interesting)
This is pretty bad... but... (Score:2, Interesting)
It's pretty bad because it has the end results of several techniques rolled into one handy package - URL spoofing, fake certs, browser highjacking...
Several workarounds being mentioned - using a non-standard toolbar (add at least one extra button/menu-item so you can identify a fake version...), and possibly a non-standard theme would work (though I'm not so sure abo
I'm protected in three ways... (Score:2, Interesting)
2. I've cutomised my toolbars to reduce them into one (plus bookmarks)
3. I have Tab Browser Extensions installed and I run in Single Window mode so all pop-up windows get opened inside my one browser window.
This is the power of Firefox!
too bad, Mozilla suite suckers! (Score:5, Informative)
don't allow pop-ups without menu/location/etc (Score:5, Insightful)
user_pref("dom.disable_window_open_feature.locati
user_pref("dom.disable_window_open_feature.menuba
user_pref("dom.disable_window_open_feature.minimi
user_pref("dom.disable_window_open_feature.resiza
user_pref("dom.disable_window_open_feature.scroll
user_pref("dom.disable_window_open_feature.status
This makes all pop-ups have a full navigation bar, location bar, status bar, and forces them to be resizable and scrollable.
It may look uglier than plain-window pop-ups, but it does keep you in full control of your browser.
With these options set, the spoof pages look obviously like what they are: a fake browser within a real browser.
Re:don't allow pop-ups without menu/location/etc (Score:3, Informative)
Really, there should be a single preferences option that turns all this off though. Of course when Netscape does their re-release of Mozilla *their* version won't have that option.
remote content should only control "client area" (Score:5, Informative)
Some site authors may say "but I really want to author a popup that doesn't have all that crap etc," but I don't see how it can be that important, especially given all the consequent badness. The only case I can see for this is that sometimes you do trust the content author--that there is a notion of Mozilla as a platform for application development. And, hey, ok, code reuse is good, but using Mozilla as a platform for a company-internal application is a totally different scenario; can't we recognize that as a different scenario and give it different rules instead of using one browser to rule them all?
Now, without being able to disable the location bar, you can't spoof the location bar trivially. You could put up a second one and hope people don't notice, and yeah, some people won't. Unfortunately, as pointed out on bugzilla, there's a case that this won't stop: you create an entire faux window, one that appears to be in front of the main one, but is actually just a part of it. So in the middle of your page you have a seeming popup window with a seeming location bar with a faux address. It wouldn't be draggable outside of the client area of the main window, but some people wouldn't notice it.
It's hard to see how to defend against that, although I am a wacky retro guy who thinks all of this DHTML stuff has given content creators way more power than they really need, and there would be nothing wrong with just pushing back on the standards until things weren't spoofable. (Remember when standards meant you wrote an RFC about something you had already implemented and figured out really worked; it didn't become a standard until people had exercised it in the field? Whatever happened to that?) Or maybe Ian Hickson is right and we're all just raving paranoic nutjobs. But it seems like exactly the sort of 'power before security' attitude that's gotten MS in a lot of trouble.
An entirely different way of looking at the problem of spoofing is that we transmit our secrets "in the clear" to the remote site. (Obviously encrypted by https or whatever.) If the remote site is spoofing, they get our password (and can maybe even open a connection to paypal or whatever and pass through everything so we don't know it's been spoofed). There's no need for us to give the secret to the remote site, though; just prove that we know it. For example, the server can give us some random data, and we use a non-reversible encryption algorithm to combine the random data and the password, and return the result of that. The server can verify that it's the right result without anyone transmitting the actual password (though the server must store the actual password, and not a hash of it). If this were the technology we were using, a spoofer wouldn't be able to use the password, unless the spoofer DID open a connection to the real site first, and get the challenge; then it could pass it through, but then the spoofer would have only this one chance to make use of the spoofed data, since the next time the real site challenged, the spoofer is stuck; whereas currently a spoofer just captures the user/password combo and keeps it around for later processing. This would raise the complexity bar for making effective use of spoofing (including email phishing!), although I don't know if it's high enough. But good luck getting it into browsers AND making it impossible for spoofers to create what looks like a login prompt of this kind but actually is just a plain old plaintext submit.
Expect this to get more prevalent (Score:4, Insightful)
This kind of spoofing is going to become more problematic, not less.
It's not just a bug, it's a bad user interface! (Score:5, Insightful)
There shouldn't be a mechanism in the HTML/script/etc to do things like pop-ups, pop-behinds, moving windows, windows without toolbars and status bars... there should be an unbreakable firewall at the edge of the document portion of the browser.
Signed Xul or trusted XUL sites (Score:3, Insightful)
I realize we now have dialogs that warn us about everything AND that most people just click through but having trusted XUL sites or signing it somehow would be just fine by me.
What really annoys me is that:
A) The bug was marked confidential for 5 freaking years!
B) The people saying that it isn't a big deal.
It IS a big deal or else the damn thing wouldn't have been marked confidential for 5 years. Sure it doesn't allow you to overwrite system files but I can recover from a virus. It's harder to recover from having a bank account wiped out because you used and unprotected debit card on a spoofed website ( forgetting that anyone who uses a debit card instead of a real credit card online is just asking to be screwed ).
Really the best route for this is to disallow remote XUL execution by default with an option to enable it in the prefs with a list of trusted XUL sites.
Why is this article specific to Mozilla? (Score:4, Insightful)
What am I missing when I don't understand why this problem is specific to XUL in Mozilla?
YOU CANNOT DO THE SAME THING WITH IE!! (Score:4, Interesting)
This is why the Mozilla vulnerability is so serious. You could fool even very experienced users. Like sysadmins who log in as root.
XUL is bloated and slow (Score:4, Interesting)
I really think (as others have also mentioned) there is a lot of blinkered thinking when it comes to Open Source software, to the extent that people are starting to blindly ignore the flaws - these same flaws in Microsoft apps would be pilloried mercilessly, but here you see all kinds of "yeah, but" comments. I am not putting down OSS, but the XUL thing was a classic example of developers going away to make a browser, and coming back with a bloated, swiss-army-knife, can-customize-up-the-wazoo Internet Platform. I don't particularly care about changing the "skin" on my browser - all I want is a small, fast application that adheres to standards and is preferably cross platform. They could have gotten the cross-platform part by using something like wxWidgets [wxwidgets.org]. I thought Firefox was supposed to be smaller and faster, but unfortunately XUL still seems to be at its core. And for those who say "Well, why don't you go away and make your own browser" - I have other projects I am working on and don't have the time.
And to all those people who say that I should just get a new computer - well, tell that to all the schools out there who have old computers donated for teaching the kids. Anyway, Why should I have to upgrade because of one application - a BROWSER of all things? Just a classic case of developers going over the top to prove to everybody just how smart they are and how generalized their code is. And what do you know, now we find out that there seems to be a darker side to all this customizable GUI code. Oh well...
BTW, I don't hate Mozilla. This is a criticism of one aspect of the project that I think just went severely off-track with featuritis. The project is very worthy effort and I applaud the people who are making it, but these are just my honest thoughts on the matter.
I wasn't vulnerable! (Score:5, Informative)
That didn't prevent the statusbar hack, but it made everything else *really* obvious.
Have a look at about:config. There's a lot of useful stuff in there.
Bad, but not as bad (Score:3, Informative)
Granted, I'd like to see it more secure by default , e.g., it doesn't install software by default, Javascript disabled, etc. This also isn't uniquely a Mozilla problem as the first versions of Red Hat shipped with telnet and rlogin ports open by default. It all goes back to the age old debate about security versus functionality.
Javascript issue (Score:3, Informative)
As others have mentioned, you can change the Javascript behaviour to ensure that all new windows will always retain their title and control bars. Consequently it is amtter of configuring your browser properly.
The FF team made an admirable effort to come up with a default configuration in prefs.js that mostly works and adding a few lines to it is a matter of concientious system administration.
My son told me he did a screen capture on the computer of his comp sci teacher, then installed it as a background and had the poor guy futz around for a long time trying to figure out why all his icons and taskbar is dead - we cannot honestly say that such an exploit is a bug in Windows now can we?
Re:Javascript should be enabled. (Score:5, Insightful)
what sort of moron would let a webpage run code on his machine anyway?
The average user.
Re:Not really an exploit.. Not really new either (Score:2)
Oh dear, the old "if you can't fix it yourself don't complain about it" attitude.
If he can figure it out on his own then so can hackers, not telling anyone just means that *no-one* can work on a fix (which is why no bugs should ever be maked as confidential unless one of the main developers plans to release a fix for
Re:Uselss Spoof (Score:3, Informative)
Yet, based on their track record, they do the job.
So an exploit that does a better job than that, well, it's a problem. The problem should be blocked at
Re:Holy Shit (Score:4, Informative)
Try this, it mostly works:t ion", true);
b ar", true);
m izable", true);
z able", true);
l lbars", true);
u s", true);
./.mozilla/firefox/default.flc/prefs.js
user_pref("dom.disable_window_open_feature.loca
user_pref("dom.disable_window_open_feature.menu
user_pref("dom.disable_window_open_feature.mini
user_pref("dom.disable_window_open_feature.resi
user_pref("dom.disable_window_open_feature.scro
user_pref("dom.disable_window_open_feature.stat
It is only the last line that seems to be buggy, since the status bar still gets overloaded.