Mozilla Disables Firefox Add-On, Recommends Upgrade
The disabled Mozilla Sniffer was intercepting login data and transmitting it to a third-party website; upgrading to the latest version of the CoolPreviews add-on is recommended due to security vulnerability.
The Mozilla Foundation, which maintains the popular Firefox web browser, announced Tuesday that it removed a Firefox add-on called "Mozilla Sniffer" which was intercepting login data and transmitting it to a third-party website. Mozilla also warned of a security escalation vulnerability in the CoolPreviews add-on and recommended that users upgrade immediately to the latest version.
Before its removal, Mozilla Sniffer had been downloaded approximately 1,800 times and had 334 active daily users. Mozilla said that each of them should have now received an uninstall notification. Furthermore, anyone with the add-on currently installed can uninstall it to prevent further passwords from being intercepted. Mozilla also recommended that anyone who has used the tool immediately change all of their passwords.
More SMB Insights
- IT Consumerization in SMBs: How to Manage User Demands
- Reduce Cost and Improve Manageability with IBM Windows Storage Server
- Endpoint Protection Performance Benchmarks
- Lightweight Application Development Systems Ride the Cloud: IDG Report
- Best Practices: 6 Security Services Every Small Business Must Have
- Strategy: How SMBs Can Fight Cybercrime
At the time of the vulnerability announcement, however, Mozilla noted that the website collecting information from Mozilla Sniffer was down, making it unclear whether the threat was still active.
Mozilla Sniffer was a variation on Tamper Data, designed for viewing and modifying HTTP and HTTPS headers and post parameters. Many developers use that add-on for testing web application behavior, to monitor exactly what data gets passed via HTTP, or for penetration testing. Tamper Data, however, doesn't route intercepted data to an external website.
Proof of concept code for exploiting the vulnerability has been released, though Mozilla said that no malicious exploits have yet been detected. But as of Tuesday, 177,000 users - less than one-quarter of the software's install base - were still running a vulnerable version. Mozilla advised them to install the latest, patched version.
To prevent add-ons such as Tamper Data from gaining distribution, Mozilla is also retooling its code-review policies. Technically, Tamper Data was an experimental add-on, meaning that users had to click through warnings that it hadn't been reviewed and might pose a threat.
As Mozilla noted in its security announcement, "unreviewed add-ons are scanned for known viruses, trojans, and other malware, but some types of malicious behavior can only be detected in a code review."
Accordingly, Mozilla plans to require code reviews for all add-ons before they become publicly available on Mozilla's website.
Can't make it to the Black Hat USA security conference this July? With Black Hat Uplink, you can experience the presentations online. Events will be streamed live on July 28-29, but you will be able to view Uplink presentations for 90 days after that. Click here to find out more.