Address bar spoofing in Firefox Lite for Android

Date reported — 2019–08–29


Firefox Lite 1.9.2 for Android and earlier suffer from exhaustive Address Bar Spoofing, allowing attackers to potentially trick a victim into visiting a malicious domain for legitimate domain name. Firefox Lite is almost installed on more than 10M devices.


URL Address Bar spoofing is the worst kind of phishing attack possible because it’s the only way to identify the site which the user is visiting for a non-technical user. URL address bar is the only way to trust a website and if this indicator is hijacked, the whole security of any normal user will be compromised.


The address bar can be spoofed by a crafted javascript page with setInterval() function which executes pwn() function which ultimately reloads target URL in every 10ms.

Proof of concept (POC)

  1. Opening Firefox Lite; Latest version i.e.1.9.1 (13361)
  2. Spawning a HTTP web-server with the attached payload i.e. spoof.html
  3. Loading the page e.g
  4. URL gets spoofed and shows contents of spoof.html while URL points at

Video demo —

Expected behavior

The browser should successfully redirect to the target website.

Reply from Mozilla

Quickly acknowledging, validating, and resolving submitted issues while recognizing the researcher’s effort is vital for successful vulnerability coordination, but the report didn’t got any attention after initial triage and half-hearted discussion.

…11 months later

I got fed up after waiting for months, eleven months to be exact. I emailed asking them to look at the stale bug report.

Frederik helped to re-initiate the staled report. This is what happened afterwards —

Thanks for the notification, — REDACTED — ! we’ll prioritize this issue in the sprint planning later today. — REDACTED —

Hi folks,
Per the given information and testing result, this issue is reproducible only on old webview versions (70).
Users has to update Chrome and Firefox Lite to latest version so that they get better security.
And then the coming tricky problem is we don’t have good position to prompt users to update their Chrome.
As we have very small user base hanging on that (or older) version so the impact is fairly limited.
That said, we don’t see immediate action to take on this issue.

Lingering the report for 11 months while the Google’s webview versions regularly updated; establishing low impact with a ridiculous reason.

It’s like saying — “Oh yeah, there’s RCE possible but we don’t use the software which has the bug you know, so the impact is fairly limited”.

I don’t think the reply needs any more explanation. I leave it up to you to judge the response. I’m not gonna do anything now. Let’s see what happens.

Peace out.

Originally published on Tinkering the kernel.




Google Code-In C. Winner. GsOCer ‘19. Independent Security Researcher. Have hacked Medium, Mozilla, Opera & many more. Personal Website:

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Upgrading to the Universal Render Pipeline

Python random Module — Generate Random Numbers/Sequences

【 o8.o5 to o8.11 | Gate o7 - The Key of Guidance 】

Easiest and Free way to host your React App

How To Send An Email Using Amazon Simple Email Service (SES) Part-(3 of 3)

How to Choose the App for Miners in 2020? — Joy Dev Blog

NUS Module Review — AY 17/18 S2

msbi online course | msbi online training | OnlineITGuru

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Piyush Raj ~ Rex

Piyush Raj ~ Rex

Google Code-In C. Winner. GsOCer ‘19. Independent Security Researcher. Have hacked Medium, Mozilla, Opera & many more. Personal Website:

More from Medium

Security Advisory: Android UNISOC Chip Vulnerability

Explaining Babuk Ransomware

Using AWS S3 with Unity

Masscan with HTTPS support