Mozilla versions of Firefox that do not contain the PDF Viewer, such as Firefox for Android, are not affected by the "Same origin violation and local file stealing via PDF reader" vulnerability.
Learn Insider Threat Detection with Application Response Strategies
Discover how application detection, response, and automated behavior modeling can revolutionize your defense against insider threats.Join Now
All an attacker need to do is load the page with this exploit and sit back and relax. The exploit will silently steal files in the background.
According to Mozilla lead security researcher Daniel Veditz, the exploit specifically searches for:
- FTP configuration files, subversion, s3browser, Filezilla, libpurple and other account information on Windows systems.
- Global configuration files and user directories on Linux systems.
Any files encountered by the exploit are uploaded to a server in Ukraine.
"The exploit leaves no trace it has been run on the local machine," Veditz wrote in a blog post. "If you use Firefox on Windows or Linux it would be prudent to change any passwords and keys found in the above-mentioned files if you use the associated programs."
Mac users are currently safe from this exploit, but researcher warned that another payload could potentially exploit the same vulnerability to target Mac systems.
All versions of Firefox are affected, but the good news is that Mozilla has fixed the issue in its software. So, users are recommended to update browsers to Firefox 39.0.3 to protect against the exploit. Enterprise users can patch to 38.1.1.