lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 06 Aug 2007 18:37:05 -0400 From: Jonathan Smith <smithj@...th.com> To: Robert Swiecki <jagger@...ecki.net> Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com Subject: Re: Konqueror: URL address bar spoofing vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Robert Swiecki wrote: > The second one is based on the http URI scheme which allows embedding > user/password parameters into it, i.e. http://user:password@...ain.com. > Such parameters can contain whitespaces, so the attack vector is quite > obvious. > > http://alt.swiecki.net/konq3.html > > Tested with Konqueror 3.5.7 on Linux 2.6 This does interesting things to firefox as well. Specifically, it hangs seemingly indefinably (with no cpu utilization). Tested with firefox-2.0.0.6 on Foresight Linux (firefox=/foresight.rpath.org@fl:1-devel//1/2.0.0.6-1-1). smithj -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.4 (GNU/Linux) iD8DBQFGt6KR0e1Yawpq2XMRAptmAJ9YTUDtNKUctdrfPDLGn6sWug/ivwCeIYvE IpsCSHCIHi6dyzWPebwp/wU= =bLFr -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists