Bugtraq mailing list archives
URL spoofing bug involving Firefox's error pages and document.write
From: jplopezy () gmail com
Date: Fri, 24 Jul 2009 14:46:33 -0600
Application: Firefox 3.0.11 OS: Windows XP - SP3 ------------------------------------------------------ 1 - Description 2 - Vulnerability 3 - POC/EXPLOIT ------------------------------------------------------ Description This software is a popular web browser that supports multiple platforms as (windows,linux,macos). ------------------------------------------------------ Vulnerability The bug is caused when you try to open a url with a invalid char, in this time, you can edit the error page, and make a "spoof". This not would be important because when you make the spoof the "invalid web" is loading all time, but as firefox allow that you call the "stop" method of other page you can stop this. The result of this is a fake page. ------------------------------------------------------ POC/EXPLOIT The poc is a simple script that have a window.open(), it calls the url with invalid char, the invalid char can be a "," or "%" is important that you add some "%20" for display a "white space" in the url. http://es.geocities.com/jplopezy/firefoxspoofing.html PD : I send this to bugzilla ------------------------------------------------------ Juan Pablo Lopez Yacubian
Current thread:
- URL spoofing bug involving Firefox's error pages and document.write jplopezy (Jul 24)
- Message not available
- Message not available
- Re: URL spoofing bug involving Firefox's error pages and document.write xu shaopei (Jul 27)
- Re: URL spoofing bug involving Firefox's error pages and document.write YGN Ethical Hacker Group (http://yehg.net) (Jul 27)
- Message not available
- Message not available
- <Possible follow-ups>
- Re: URL spoofing bug involving Firefox's error pages and document.write security (Jul 27)
- Re: URL spoofing bug involving Firefox's error pages and document.write Michael Wood (Jul 27)