A Bug Could Let Attackers Hijack Firefox for Android via Wi-Fi Network

Pricey Android people, if you use the Firefox internet browser on your smartphones, make sure it has been up to date to version 80 or the latest out there variation on the Google Perform Retailer.

ESET safety researcher Lukas Stefanko yesterday tweeted an warn demonstrating the exploitation of a not too long ago disclosed substantial-threat remote command execution vulnerability influencing the Firefox application for Android.

Discovered initially by Australian stability researcher Chris Moberly, the vulnerability resides in the SSDP motor of the browser that can be exploited by an attacker to target Android smartphones connected to the very same Wi-Fi community as the attacker, with Firefox app set up.

SSDP, stands for Easy Provider Discovery Protocol, is a UDP primarily based protocol that is a part of UPnP for acquiring other units on a community. In Android, Firefox periodically sends out SSDP discovery messages to other equipment linked to the identical community, wanting for next-display units to cast.

Any machine on the area community can answer to these broadcasts and deliver a spot to get specific information on a UPnP unit, just after which, Firefox tries to obtain that place, expecting to discover an XML file conforming to the UPnP requirements.

In accordance to the vulnerability report Moberly submitted to the Firefox crew, the SSDP motor of the victims’ Firefox browsers can be tricked into triggering an Android intent by simply just changing spot of the XML file in the response packets with a specially crafted concept pointing to an Android intent URI.

For this, an attacker connected to a focused Wi-Fi community can operate a malicious SSDP server on his/her product and induce intent-based instructions on close by Android products as a result of Firefox—without necessitating any conversation from the victims.

Actions permitted by the intent also incorporates immediately launching the browser and open up any described URL, which, in accordance to the researchers, is adequate to trick victims into furnishing their qualifications, set up destructive apps, and other destructive routines centered on the surrounding situations.

“The focus on simply just has to have the Firefox application working on their cell phone. They do not require to access any malicious web-sites or simply click any destructive one-way links. No attacker-in-the-middle or malicious application set up is demanded. They can basically be sipping coffee whilst on a cafe’s Wi-Fi, and their device will begin launching application URIs beneath the attacker’s control,” Moberly mentioned.

“it could have been employed in a way equivalent to phishing attacks the place a malicious site is pressured onto the focus on with out their information in the hopes they would enter some delicate details or agree to set up a destructive application.”

Moberly claimed this vulnerability to the Firefox workforce a couple weeks again, which the browser maker has now patched in the Firefox for Android variations 80 and later on.

Moberly has also released a evidence-of-thought exploit to the public that Stefanko utilized to reveal the concern in the earlier mentioned video clip versus 3 units related to the exact community.

Fibo Quantum