Dear fash1on@xxxxxxxxx, It looks like in order to exploit this, attacker must be able to insert form in content of exploited site. That is, to exploit this vulnerability, e.g. crossite scripting vulnerability is required. In this case, this is a flow, but not so big one. Is it so, or I miss something? --Wednesday, November 22, 2006, 12:57:43 PM, you wrote to bugtraq@xxxxxxxxxxxxxxxxx: fgc> "Today, Mozilla made public bug #360493, which exposes fgc> Firefox's Password Manager on many public sites. The flaw derives fgc> from Firefox's willingness to supply the username and password fgc> stored on one page on a domain to another page on a domain. For fgc> example, username/password input tags on a Myspace user's site will fgc> be unhelpfully propagated with the visitor's Myspace.com fgc> credentials. It was first discovered in the wild by Netcraft on fgc> Oct. 27. As this proof-of-concept illustrates, because the fgc> username/password fields need not be visible on the page, your fgc> password can be stolen in an almost completely transparent fashion. fgc> PoC here: http://www.info-svc.com/news/11-21-2006/rcsr1/ -- ~/ZARAZA Почтенные ископаемые! Жду от вас дальнейших писем. (Твен)