• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Data Leakage Bug in Mozilla Firefox Confirmed

January 28, 2008

Views: 5,320

[ad]

It seems a data leakage bug has struck Firefox recently and has been confirmed by Window Snyder the security bod at Mozilla.

It’s basically a Chrome directory traversal bug (It seems a lot of the Firefox issues have had to do with chrome?).

It’s rated as low risk, but it can give away the existence of files (if the attacker knows the name and location).

The bug resides in Firefox’s chrome protocol scheme and allows for a directory traversal when certain types of extensions are installed. Attackers could use it to detect if certain programs or files are present on a machine, gaining information to use in perpetrating another, more malicious exploit.

Normally, Firefox’s chrome package is restricted to a limited number of directories, but a bug in the way it handles escaped sequences (i.e. %2e%2e%2f) allows attackers to escape those confines and access more sensitive parts of a user’s computer. The exploit only works if a user has made use of Firefox extensions that are “flat,” this is, those that don’t package their files in a jar archive. Examples of flat add-ons include Download Statusbar and Greasemonkey.

You can protect yourself by using NoScript, which I would guess most of you guys are using already.

The open bug can be found here.

Source: The Register

Related Posts:

  • An Introduction To Web Application Security Systems
  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • WannaCry Ransomware Foiled By Domain Killswitch
  • Intel Finally Patches Critical AMT Bug (Kinda)
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • Privacy Implications of Web 3.0 and Darknets
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Exploits/Vulnerabilities, Privacy Tagged With: firefox, firefox exploit, firefox-vulnerability, hacking-firefox, mozilla, software-security, web-security



Reader Interactions

Comments

  1. Adam says

    January 28, 2008 at 4:38 pm

    Thanks for the info. that’s actually quite scary as Firefox is my default browser.

  2. goodpeople says

    January 29, 2008 at 10:26 am

    Like you said.. low risk. No need to get paranoid over this one..

    btw, those of you that wonder why my responses are kinda short lately, that’s because I broke my left wrist. Typing is somewhat difficult.

  3. Keola says

    January 30, 2008 at 4:32 am

    Great information and thanks for the link on NoScript.

  4. Nobody_Holme says

    January 30, 2008 at 4:25 pm

    Ouch. Unlucky. Good luck with the wrist dude.
    and ta darknet. must go make people i know get noscript going.

  5. Pantagruel says

    January 30, 2008 at 10:57 pm

    A minor hickup but a good thing you point us toward NoScript.

    Good luck with the wrist goodpeople (plastered in or did you get some steel bolted on?)

  6. mumble says

    January 31, 2008 at 12:16 am

    At least this is (1) an easy fix in the code and (2) in a product that uses auto-update. I figure my windows boxes will get the update when it is released (sometime this week).

    @goodpeople
    Don’t push too much until it heals. You get two at birth, and no replacements will be issued. Be sure to follow up on PT – you don’t want to have a gimpy wrist for an extended period of time. Good luck and get well soon.

  7. goodpeople says

    January 31, 2008 at 12:29 pm

    Thanks for the support guys. It really helps.

    To answer some questions you all probably have, I fell while I was skating. It was my third time on skates, so I’m not that good yet.. :-)
    Fortunately it is a clean break, so a bit of plaster for 5 weeks should do the trick. I am afraid that I will need some Physical Therapy as well, but I’ll live. Worst part is that I can’t get to work now. I cannot drive or ride the bycicle.. But I’ll get another kind of plaster next week that doesn’t require me to wear a sling all day…

  8. Nobody_Holme says

    January 31, 2008 at 1:35 pm

    Auto update, how i love thee.
    Makes everyone’s life easier.

    and i’m thinking no more skating for you for a couple of months. :P

  9. goodpeople says

    January 31, 2008 at 2:19 pm

    @Nobody_Holme,

    Are you talking about mozilla’s auto-update feature or Windows update?

  10. mumble says

    January 31, 2008 at 11:14 pm

    @goodpeople
    I was talking about the mozilla auto-update, which in recent verions is turned on by default. It lets them push out a fast patch for things like this.

    Realistically, this can be fixed with only a few lines of code in one file – but it would probably be a good idea to audit the code looking for other path traversal flaws. Because of the limited scope of the data leakage, though, this isn’t the end of the world…..

  11. goodpeople says

    February 1, 2008 at 1:04 pm

    @mumble,

    That’s okay. I also keep Mozilla’s auto update switched on. But I am a bit wary of Windows update. Even Linux is not allowed to do it’s own updates here. I want to see it first.

  12. Nobody_Holme says

    February 1, 2008 at 6:15 pm

    I was also talking about non-microsoft auto-updates. I’m not a fan of auto-installing brand new bugs and security flaws, i must say.

  13. goodpeople says

    February 2, 2008 at 12:29 pm

    @Nobody_Holme & mumble

    Phew! for a second there you guys had me worried ;-)

  14. Nobody_Holme says

    February 2, 2008 at 4:24 pm

    I’m slightly depressed… I cant have bashed microsuck enough around here for you to notice how much i hate them. :P

  15. Pantagruel says

    February 2, 2008 at 6:09 pm

    @ Nobody_Holme

    Rest assurred, there will be plenty of Windows wholes to bash ;)

  16. eM3rC says

    February 7, 2008 at 7:59 am

    When comparing this to all of IE’s bugs I think of this as no big deal. And like Pantagruel said, welcome to the wonderful, yet buggy/vulnerable world of windows ;).

    As for firefox addons what is everyone using?
    I currently use:
    Fasterfox
    Ad Block Plus
    Tamper Data
    and Download status bar

  17. Pantagruel says

    February 7, 2008 at 1:56 pm

    @ eM3rc

    All of the stuff you mentioned and some from the FireCat collection

  18. Nobody_Holme says

    February 7, 2008 at 4:05 pm

    Dont run download statusbar without noscript, methinks?

  19. Pantagruel says

    February 7, 2008 at 6:48 pm

    @Nobody_Holme

    You’se right.
    Block statusbar, noscript surely will.

  20. eM3rC says

    February 8, 2008 at 3:34 am

    @Pantagruel
    Could you recommend any cookie editors for firefox?

  21. Pantagruel says

    February 8, 2008 at 10:22 am

    Take a look at Cookie Edit or Add N Edit Cookies.

    You might also consider LiveHTTPHeaders if you want to get some realtime info on incoming header/file info

  22. Pantagruel says

    February 8, 2008 at 12:38 pm

    You also might want to check out Stompy http://www.darknet.org.uk/2007/03/stompy-the-web-application-session-analyzer-tool/

    for some superb session analysis (and cookie munging)

  23. J. Lion says

    February 11, 2008 at 11:21 pm

    is there an alternative to firefox besides IE?

  24. eM3rC says

    February 12, 2008 at 2:01 am

    @J. Lion
    I would stick with firefox because overall it seems to be the best browser. The next in line I would say is Opera, but firefox just released and update so no worries. In my opinion I would stick with firefox no matter what.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,304

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,147

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,415

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,330

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,246

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,122

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,434,393)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,104)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,565)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,364)
  • Password List Download Best Word List – Most Common Passwords (934,682)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,407)
  • Hack Tools/Exploits (674,322)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,448)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy