lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: venom at gen-x.co.nz (VeNoMouS) Subject: RE: FWD: Internet Explorer URL parsing vulnerability RE: FWD: Internet Explorer URL parsing vulnerabilityok if your using outlook , yay for IE being tied in, it translates all the hex for you and those urls do work inside of outlook , since IE can translate the hex, where as if u enter it manually it dont. ----- Original Message ----- From: VeNoMouS To: Julian HO Thean Swee ; full-disclosure@...ts.netsys.com Sent: Wednesday, December 10, 2003 6:03 PM Subject: Re: [Full-Disclosure] RE: FWD: Internet Explorer URL parsing vulnerability umm tested this you dont need %01 either btw. www.microsoft.com@....linux.org was messing around with some hex stile as well is there a way to call a file:// inside a http:// becos the issue with doing the @ trick is it appends http:// automaticly, mind you , u could just make it exec some vb code or something on a site, just a random idea any way and it dont also seem to work if you use hex as well for the full domain ie www.microsoft.com%40%77%77%77%2E%6C%69%6E%75%78%2E%6F%72%67 nor www.microsoft.com%40www.linux.org where as if you www.microsoft.com@...%77%77%2E%6C%69%6E%75%78%2E%6F%72%67 works ----- Original Message ----- From: Julian HO Thean Swee To: 'full-disclosure@...ts.netsys.com' Sent: Wednesday, December 10, 2003 4:22 PM Subject: [Full-Disclosure] RE: FWD: Internet Explorer URL parsing vulnerability Hmm, it doesn't seem to work on my browser :) I don't even get transported to any page when i click the button. But then again, i have everything turned off in the internet zone by default... (but my submit non-encrypted form data is on) Does it really work then? it looks like it's using javascript...? (location.href) Merry Christmas everyone :) --__--__-- Message: 1 Date: Tue, 9 Dec 2003 10:22:59 -0800 (PST) From: S G Masood <sgmasood@...oo.com> To: full-disclosure@...ts.netsys.com Subject: [Full-Disclosure] RE: FWD: Internet Explorer URL parsing vulnerability LOL. This is so simple and dangerous, it almost made me laugh and cry at the same time. Most of you will realise why...;D The Paypal, AOL, Visa, Mastercard, et al email scammers will have a harvest of gold this month with lots of zombies falling for this simple technique. ># POC ########## >http://www.zapthedingbat.com/security/ex01/vun1.htm Dont be surprised if your latest download from http://www.microsoft.com turns out to be a trojan! location.href=unescape('http://windowsupdate.microsoft.com%01@...edownloadaneviltrojanfromme.com); -- S.G.Masood Hyderabad, India PS: One more thing - no scripting required to exploit this. __________________________________ Do you Yahoo!? Free Pop-Up Blocker - Get it now http://companion.yahoo.com/ This email is confidential and privileged. If you are not the intended recipient, you must not view, disseminate, use or copy this email. Kindly notify the sender immediately, and delete this email from your system. Thank you. Please visit our website at www.starhub.com -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031210/ae2e907f/attachment.html
Powered by blists - more mailing lists