Feeds

Firefox popup exploit allows file snooping

Pop goes the weasel

Internet Security Threat Report 2014

A vulnerability in Firefox's popup blocker software creates a means to read files from affected systems, security researchers warn.

The flaw, coupled with some tricksy coding, establishes a mechanism for hackers to read user-accessible files on vulnerable system, thereby creating a means to swipe sensitive information. Firefox version 1.5.0.9 is known to be exposed to the exploit. Other versions of the popular web surfing package might also be affected.

The vulnerability was discovered by security researcher Michal Zalewski who said the exploit relies in part on the fact that normal URL permission checks, which would stop remote sites from accessing a user's filespace, are bypassed when a user chooses to manually allow a blocked popup.

For the attack to succeed hackers would have to place a predictably named file with exploit code on the target system, which sounds difficult but is far from impossible as a technical article on the flaw by Securiteam explains. ®

Remote control for virtualized desktops

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.