lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAPQ_=KWFcJTuLmP-w9Eg3kxutJfk-buVHVAiv1542rgVfA16gA@mail.gmail.com> Date: Thu, 26 Dec 2013 23:00:28 +0800 From: "Wooyun.org" <help.en@...yun.org> To: full-disclosure@...ts.grok.org.uk Subject: [Wooyun] Safari for windows PhishingAlert bypass vuln *Abstract:* The PhishingAlert of Safari stops functioning in Windows systems if an abnormal URL is being used. *Details:* There is a defense mechanism in Safari which recognizes URL deceits such as http://www.baidu.com@...l.com. The phishing alert will be activated once the HTTP URL that we want to access contains userinfo information. (as the picture below shows) [image: 内嵌图片 1] > http://apple.com@...er.me/ *Proofs of concept:* We discovered in our researches that if one or two “/” are being added before the host name, then the PhishingAlert could be bypassed. (Password of userinfo must be available) [image: 内嵌图片 2] http://apple.com:/@/xsser.me/ *From:*http://en.wooyun.org/bugs/wooyun-2013-014 -- WooYun, an Open and Free Vulnerability Reporting Platform For more information, please visit *http://en.wooyun.org/about.php <http://en.wooyun.org/about.php?>* Content of type "text/html" skipped Download attachment "071359270cc98e79b4907c409db0e2265a6f650e.jpg" of type "image/jpeg" (97953 bytes) Download attachment "071329308c35b2a5f2c222cb36f2cf391f24fc93.jpg" of type "image/jpeg" (6 bytes) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists