Full Disclosure mailing list archives
Re: Konqueror: URL address bar spoofing vulnerabilities
From: paraw <paraw () yahoo it>
Date: Mon, 06 Aug 2007 18:29:34 -0500
Robert Swiecki ha scritto:
[...] The first example uses setInterval() call with relatively small interval value (e.g. 0) to change window.location property. A browser is entrapped within the attacking web site while the user thinks that browser actually left the page. http://alt.swiecki.net/konq2.html [...]
Didn't really work on my computer. The content of the address bar could be seen changing continuously between swiecki.net and google.com, probably in a way similar to what happens with Safari.
The second one is based on the http URI scheme which allows embedding user/password parameters into it, i.e. http://user:password () domain com. Such parameters can contain whitespaces, so the attack vector is quite obvious. http://alt.swiecki.net/konq3.html Tested with Konqueror 3.5.7 on Linux 2.6
Again, it didn't work. My address bar showed "%20 () alt swiecki net/saft2.html", aligned to the right. Sure, if you scroll all the way to the left you'll just see www.google.com, but otherwise the address shown is what I reported above. Tested with Konqueror 3.5.5, KDE 3.5.5, kernel 2.6.21-r4 (gentoo), 64bit version.
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Konqueror: URL address bar spoofing vulnerabilities Robert Swiecki (Aug 06)
- Re: Konqueror: URL address bar spoofing vulnerabilities Jonathan Smith (Aug 06)
- Re: Konqueror: URL address bar spoofing vulnerabilities Jonathan Smith (Aug 06)
- Re: Konqueror: URL address bar spoofing vulnerabilities paraw (Aug 06)
- Re: Konqueror: URL address bar spoofing vulnerabilities Robert Swiecki (Aug 06)
- Re: Konqueror: URL address bar spoofing vulnerabilities Jonathan Smith (Aug 06)