lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 14 Jul 2007 21:34:42 +1200
From: Nick FitzGerald <nick@...us-l.demon.co.uk>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Opera/Konqueror: data: URL scheme address bar
 spoofing

Martin Aberastegue wrote:

> Hi Robert, it works for me on Opera 9.21 (8776) WXP SP2.
> I was trying to do the same with firefox and it seems to works too..
> but you get the "data:text/html" on the beginning of the URL.

Ummmmm -- what part of "address bar spoofing" did you not understand?

_IF_ the URL spoofing part of a URL spoofing vulnerability in one 
browser does not work in another browser, then that other browser is 
clearly NOT vulnerable to the first browser's URL spoofing 
vulnerability.

The issue Robert reported is NOT that Opera and Konqueror parse the 
data: protocol, BUT that cunning use of a data: protocol URL can be 
used to fool the user to think they're somewhere other than they are.

As you so clearly -- and accurately -- say yourself, the URL spoofing 
part of this does not work in FF, so we should give a rat's arse that 
FF handles data: protocol URLs why?


Regards,

Nick FitzGerald

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ