Proof of concept exploit for Electrum Bitcoin Wallet's JSON-RPC vulnerability.
Run Electrum, and browse to http://www.electrumizer.com.
Open your browser's console window (F12 on Chrome), and wait for the "done" message. If your 12-words seed is shown, you're vulnerable.
The test finds all running instances of Electrum using some kind of in-browser port scanning.
It then asks each running instance for its 12-words seed.
This is all done in-browser, without installing any software.
Install the latest version of Electrum Bitcoin Wallet.
If you think your old wallet has already been compromised, create a new wallet (new 12-words seed) and transfer your old wallet's entire balance to your new wallet.
Probably not, but others may not be so nice.
Why doesn't electrumizer.com use HTTPS?
The test communicates with your local Electrum wallet over unencrypted HTTP, as browsers reject Electrum's self-signed certificate.
Since browsers forbid HTTPS websites from communicating over HTTP, electrumizer.com must be served over HTTP as well.
Yes. Download the HTML and JS files, and knock yourself out.