Home / Tech News / Malicious sites abuse 11-year-old Firefox bug that Mozilla failed to fix

Malicious sites abuse 11-year-old Firefox bug that Mozilla failed to fix

Malware authors, advert farmers, and scammers are abusing a Firefox malicious program to lure customers on malicious websites.

This would not be a large deal, because the internet is fraught with this type of malicious websites, however those web sites are not abusing some new never-before-seen trick, however a Firefox malicious program that Mozilla engineers seem to have failed to mend within the 11 years ever because it was once first reported again in April 2007.

The malicious program narrows right down to a malicious web page embedding an iframe inside of their supply code. The iframe makes an HTTP authentication request on some other area. This leads to the iframe appearing an authentication modal at the malicious website online, like the only under.


For the previous few years, malware authors, advert farmers, and scammers had been abusing this malicious program to trap customers on websites the place they display all varieties of nasties, corresponding to tech reinforce scams, advert farms that reload the web page with new commercials in a loop, pages that push customers to shop for faux reward playing cards, or websites that provide malware-laced device updates.

Every time customers attempt to depart, the homeowners of those shady websites cause the authentification modal in a loop. Each time the person dismisses it, some other request is made, and a brand new modal seems, successfully holding the person captive at the malicious websites till they shut the browser altogether, and are compelled to begin a brand new surfing consultation.

However in spite of being reported again and again for seven different occasions [1, 2, 3, 4, 5, 6, 7], this factor has long gone unfixed, for unknown causes, and crooks have gladly abused all of it this time.

The most recent instance of abuse comes from a person who reported the problem as soon as once more lately, after touchdown on this kind of shady websites that attempted to power him into putting in a suspicious Firefox extension.

“In the beginning, it’s opened complete display screen mode. With some faux Home windows conversation (I’m the use of Linux so I comprehend it is faux),” the person stated. “It attempted to [force] me set up their extensions.”

“Then I press ESC to go out complete display screen. I click on the shut button of tab or window, nevertheless it does not paintings as it has this login conversation. I click on shut button of the login conversation or cancel button. Then the conversation will seem once more. I click on the ‘Do not permit’ button of extension set up pop over, however it sort of feels now not clickable. I killed the Firefox procedure, which is the one answer for me.”

Symbol: Guo Yunhe

Certain, Mozilla is an open supply undertaking, and it does not have limitless sources to care for the entire reported problems, however you would assume that once greater than 11 years a Firefox engineer would in finding the time to mend an actively exploited factor.

In response to the comments left by means of different customers at the reported factor, the Firefox crew’s perfect guess is to observe how Edge and Chrome have handled this identical factor.

Edge: The prolong between authentication modals in Edge is huge sufficient to permit the person to near the tab or the browser.

Chrome: The authentication conversation window has been moved from the browser window degree to every tab’s degree. This implies the competitive authentication dialogs simplest blocks the tab, and now not all of the browsers, permitting the person to simply shut the abusive tab.

Extra browser information:

About thebreakingnewsheadlines

Check Also

Windows 10 zero-day exploit code released online

A safety researcher has printed nowadays demo exploit code on GitHub for a Home windows …

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: