lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 06 Aug 2007 18:29:34 -0500
From: paraw <paraw@...oo.it>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Re: Konqueror: URL address bar spoofing vulnerabilities

Robert Swiecki ha scritto:
> [...]
> The first example uses setInterval() call with relatively small interval
> value (e.g. 0) to change window.location property. A browser is
> entrapped within the attacking web site while the user thinks that
> browser actually left the page.
> http://alt.swiecki.net/konq2.html
> [...]

Didn't really work on my computer. The content of the address bar could be seen changing
continuously between swiecki.net and google.com, probably in a way similar to what happens with Safari.


> The second one is based on the http URI scheme which allows embedding
> user/password parameters into it, i.e. http://user:password@...ain.com.
> Such parameters can contain whitespaces, so the attack vector is quite
> obvious.
> http://alt.swiecki.net/konq3.html
>
> Tested with Konqueror 3.5.7 on Linux 2.6

Again, it didn't work. My address bar showed "%20@....swiecki.net/saft2.html", aligned to the right.
Sure, if you scroll all the way to the left you'll just see www.google.com, but otherwise the
address shown is what I reported above.
Tested with Konqueror 3.5.5, KDE 3.5.5, kernel 2.6.21-r4 (gentoo), 64bit version.


Download attachment "signature.asc" of type "application/pgp-signature" (253 bytes)

Powered by blists - more mailing lists