Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Alexandru Burciu (alexbugmail.com)
Date: Sat Jul 26 2008 - 14:25:11 CDT
Here's just a quick example of such threat:
FFsniFF (FireFox sniFFer) is a simple Firefox extension, which
transforms your browser into the html form sniffer. Every time the user
click on 'Submit' button, FFsniFF will try to find a non-blank password
field in the form. If it's found, entire form (also with URL) is sent to
the specified e-mail address. It also has the ability to hide itself in
the 'Extensions manager'. This extension is meant to be as an example of
the 'evil side of Firefox extensions'.
On Mon, Jul 14, 2008 at 1:55 PM, Andrei Hanganu <handreigmail.com> wrote:
> I have recently started work on a xpcom component for Firefox,
> astonished i was by the fact that in an XPI archive file one can
> include binary libraries (dll/so files) that get auto loaded in
> firefox via a precise function prototype. The problem is that the code
> in that component is allowed to do anything the user that runs firefox
> has credentials to do.
> Wham i am curious is if there have ever been reported malicious
> mozilla extensions, and if besides the signing of the addon is there
> any other way to protect from such addons.
- application/pgp-signature attachment: OpenPGP digital signature