1423146 - Do not allow an auth prompt requested by an image resource loaded from cross-origin (original) (raw)

Closed Bug 1423146 Opened 7 years ago Closed 7 years ago

Do not allow an auth prompt requested by an image resource loaded from cross-origin

Categories

(Core :: Networking: HTTP, enhancement, P3)

Tracking

()

| Webcompat Priority | | | ---------------------- | | | Performance Impact | | | Webcompat Score | | | a11y-review | | | Accessibility Severity | |

Tracking Status
firefox59 --- fixed

| Tracking | Status | | | ------------------- | ------ | | | relnote-firefox | | | | thunderbird_esr115 | | | | thunderbird_esr128 | | | | firefox-esr115 | | | | firefox-esr128 | | | | firefox59 | | | | firefox131 | | | | firefox132 | | | | firefox133 | | |

People

(Reporter: dragana, Assigned: dragana)

Reset Assignee to default

References

Details

(Keywords: dev-doc-complete, site-compat, Whiteboard: [necko-triaged])

Bug Flags:

| | behind-pref | | | | | ------------------ | | | | | | firefox-backlog | | | | | | sec-bounty | | | | | | sec-bounty-hof | | | | | | in-qa-testsuite | | | | | | in-testsuite | | | | | | qe-verify | | | |

Crash Data

Security

(public)

This bug is publicly visible.

User Story

Attachments

(1 file)

We only need to change pref.

Chrome already have this as default(bug 647010 comment 87) so I do not expect that we will break something.

Do we need an intent-to-ship for this?

(In reply to Christoph Kerschbaumer [:ckerschb] from comment #4)> Do we need an intent-to-ship for this?I will write one, although Chrome already implement this.

Priority: -- → P3

Whiteboard: [necko-triaged]

Status: ASSIGNED → RESOLVED

Closed: 7 years ago

Resolution: --- → FIXED

Target Milestone: --- → mozilla59

Flags: needinfo?(dd.mozilla)

Flags: needinfo?(dd.mozilla)

Hello! This bug is just the same as my Bug 647010, which I informed Mozilla about in March 2011. This is vulnerability in all browsers, which support Basic/Digest Authentication, as I wrote in my entry. So a lot of web browsers are vulnerable, not only Firefox. I called this attack as Onsite phishing (or Inline phishing). It can be used (including by phishers) for stealing of logins and passwords of users of web sites.

You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:

Updated:

Size:

Description

File Name

Content Type