lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 29 Oct 2004 01:34:17 -0400
From: GuidoZ <uberguidoz@...il.com>
To: "0-1-2-3@....de" <0-1-2-3@....de>
Cc: bugtraq@...urityfocus.com
Subject: Re: New URL spoofing bug in Microsoft Internet Explorer


Update to my previous email (quoted below) which was in reply to
Benjamin's original email (quoted at bottom).

Using Win XP Pro w/ SP2 (Fully patched according to Windows Update -
IE version: 6.0.2900.2180), his example does NOT work. If you hover
your mouse just above the link (where the table border would be), it
says Microsoft.com, however, going over the actual link inside the
table will properly reveal Google.com. (Maybe Microsoft patched this?
Not sure what is meant by "fully patched" in Benjamin's text. Fully
patched according to what?)

My example still holds true however, as I expected. I wouldn't call it
a bug or an exploit really. It's more like an "abused feature" if
anything. It's not a glitch or an example of bad coding. It's just yet
another deceptive way to fool someone using the resources available.

Comments?
Email: exploit _AT_ guidoz _DOT_ com 

More info here: http://www.guidoz.com/btstatusurl.html

--
Peace. ~G


On Fri, 29 Oct 2004 00:53:49 -0400, GuidoZ <uberguidoz@...il.com> wrote:
> I'm not arguing that this isn't a bug mind you - it certainly is
> something that should be looked at. (I haven't tested it myself... no
> Windows box handy.) However, you can accomplish basically the same
> thing with a little bit of inline javascript:
> 
> <a HREF="http://www.google.com/"
> onMouseOver="window.status='http://www.microsoft.com/';return true"
> onMouseOut="window.status='Done';return true">Click here</a>
> 
> Hovering over the link will display the "fake" Microsoft.com link in
> the status bar. Leaving the link will revert to saying "Done" when
> leaving the link. (Done is what appears in IE after a page is loaded.)
> Clicking it will goto Google.com
> 
> This trivial, yet effective, method has been used for years for
> advertising sites that want to hide the affiliate ID or whatever.
> Plus, it's easier then making a table around every link, which will
> throw off the formatting in some browers. =) On the other hand, if you
> have javascript disabled (or not supported), then this wouldn't fool
> you. 6 of one and half a dozen of the other. (Something else to note -
> the inline javascript will work across multiple browsers. Not just
> IE.) Either way, viewing the page source will reveal the truth,
> obviously.
> 
> FWIW, I have made a quick page that hosts both "exploits" here as HTML:
>  - http://www.guidoz.com/btstatusurl.html
> 
> Now you can see them as HTML in case your mail program doesn't.
> This was done *very* quickly in kwrite, so no comments about the coding. =P
> (Let me know if something doesn't work like it should however and I'll fix it.)
> 
> --
> Peace. ~G
> 
> 
> 
> 
> On Thu, 28 Oct 2004 23:38:16 +0200, 0-1-2-3@....de <0-1-2-3@....de> wrote:
> > New URL spoofing bug in Microsoft Internet Explorer
> >
> > There is a security bug in Internet Explorer 6.0.2800.1106 (fully patched),
> > which allowes to show any faked target-address in the status bar of the
> > window.
> >
> > The example below will display a faked URL ("http://www.microsoft.com/") in
> > the status bar of the window, if you move your mouse over the link. Click
> > on the link and IE will go to "http://www.google.com/" and NOT to
> > "http://www.microsoft.com/" .
> >
> > <a href="http://www.microsoft.com/"><table><tr><td><a
> > href="http://www.google.com/">Click here</td></tr></table></a>
> >
> > Description: Microsoft Internet Explorer can't handle links surrounded by a
> > table and an other link correct.
> >
> > The bug can be exploited using HTML mail message too.
> >
> > Affected software: Microsoft Internet Explorer, Microsoft Outlook Express,
> > ...
> >
> > Workaround: Don't click on non-trusted links. Or right-click on links to
> > see the real target. Or use Copy-and-Paste.
> >
> > Regards,
> > Benjamin Tobias Franz
> > Germany
> >
> >
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ