lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 24 Jul 2009 14:46:33 -0600
From: jplopezy@...il.com
To: bugtraq@...urityfocus.com
Subject: URL spoofing bug involving Firefox's error pages and document.write

Application: Firefox 3.0.11 
OS: Windows XP - SP3
------------------------------------------------------ 
1 - Description 
2 - Vulnerability 
3 - POC/EXPLOIT 
------------------------------------------------------ 
Description 

This software is a popular web browser that supports multiple platforms as (windows,linux,macos).

------------------------------------------------------ 
Vulnerability 

The bug is caused when you try to open a url with a invalid char, in this time, you can edit the error page, and make a "spoof".

This not would be important because when you make the spoof the "invalid web" is loading all time, but as firefox allow that you call the "stop" method of other page you can stop this.

The result of this is a fake page.
 
------------------------------------------------------ 
 POC/EXPLOIT 
 
The poc is a simple script that have a window.open(), it calls the url with invalid char, the invalid char can be a "," or "%" is important that you add some "%20" for display a "white space" in the url.

http://es.geocities.com/jplopezy/firefoxspoofing.html
 
PD : I send this to bugzilla
------------------------------------------------------ 
 Juan Pablo Lopez Yacubian 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ