Tags: bugs, code, firefox, hackers, software
Firefox still sucks. I don’t care what everyone else in the world thinks, and I know it’s an unpopular opinion, but it’s the truth. While they bitch about “standards” all the time, the fact is, 95% of what Firefox calls “a standard” isn’t even ratified yet. When developers can’t tell a “Standard” from a “Request For Comment,” all sorts of malady ensues.
It’s also disingenuous on the part of Web Developers to say, “It won’t render right in IE because IE sucks!” when the fact is, any Web Developer worth their salt would make an attempt to make a page render right in the predominant browser and its inferior counterpart. Yet, for some reason, the call is to “blame Microsoft” every time a Developer makes a stupid mistake or doesn’t know what the Hell they’re doing…
There’s also this ridiculous assertion that Firefox is inherently bullet-proof as far as being hackable. The case is that IE is the predominant browser, so it makes sense to use it as the target for widespread attacks. Firefox is an even more broken mess from a Security standpoint, and the veracity of its issues span across multiple platforms, despite claims otherwise.
A nice little case in point of “shitty code” in Firefox is this attack vector I found two years ago and apparently still isn’t fixed…
Get out your favorite PHP editor, and send an image in a stream… but in the header, use these two lines instead of something normal:
echo "Content-type: image/jpg"; echo "Content-length: 0";
Now, with every other user-agent in the world, this won’t work for two very important reasons:
- “image/jpg” is not a valid content-type. “image/jpeg” is.
- A connection-length of zero bytes tells the user-agent not to receive any data.
Firefox, on the other hand, will go ahead and render the invalid content-type, zero-byte image at whatever size the Server streams to it, proving that it doesn’t care what’s actually being received from a possibly malicious host.
Can you say, “Exploitable,” boys and girls?
I knew you could…