for (i=0,c=document.forms.length;i<c;i++) {
if (document.forms[i].method == 'get') {
var password = false;
for (l=0,k=document.forms[i].elements.length;l<k;l++) {
if (document.forms[i].elements[l].type == 'password') {
password = true;
}
}
if (password == true) {
document.forms[i].method = "post"
}
}
}
Essentially it just loops through all the forms on a page and sets the method on all forms with password fields to post. So while this will stop you from the attack I described, it will most likely break sites, so once a patch comes out of Mozilla (which I honestly hope it will, because otherwise all their efforts on the previous patch will be in vain), this will need to be removed.
Also, since this script is extracting method and type values from the DOM, it doesn't have to worry about case, obfuscation, etc, so it should not be vulnerable to any obfuscation of either the type or the method properties.
I'm sure you all know how to install Greasemonkey scripts,so I'm not going to bother explaining how to here, because for those who don't there's always Google.
P.S. 50th Post! Hurray, I've managed to actually stay interested in something for an extended period of time. I'm sure that some of the posts were completely disinteresting to people, but I hope that some of them weren't.
No comments:
Post a Comment