Mozilla Partially Vulnerable to Internet Explorer URL Spoofing Security Flaw
Thursday December 11th, 2003
koody wrote in to tell us that Mozilla is partially vulnerable to the recently announced URL spoofing security hole in Internet Explorer. The latest IE flaw allows an attacker to disguise the true domain of a URL in the browser's Address Bar, allowing a page located at evilscam.net to appear to be from microsoft.com. This exploit can be used to increase the effectiveness of the so-called 'phishing' scams that have recently been used to target customers of PayPal, eBay and several online banks.
The Address Bar URL spoofing flaw was originally reported by Sam "Zap The Dingbat" Greenhalgh, who provided details of the exploit and a demonstration. Security company Secunia issued an advisory about the vulnerability, with an update from Chris Hall reporting that the URL shown in the Status Bar while mousing over a link to a spoofed page is also affected. While Mozilla-based browsers such as the Mozilla Application Suite and Mozilla Firebird are immune to the more serious Address Bar spoofing, they appear to be vulnerable to the Status Bar variant.
The Secunia Internet Explorer Address Bar Spoofing Test page demonstrates both the full flaw in IE and the Status Bar aspect of it that affects Mozilla. The relevant Bugzilla report is bug 228176, which was filed today and already has a preliminary patch attached (please do not add unnecessary comments to the bug; the developers are already aware of its seriousness). Mozilla users are advised to not rely on the URL displayed in the Status Bar and to check the complete address of the destination page in the Location Bar upon arrival.
#31 Re: More vulnerabilities
Friday December 12th, 2003 3:54 PM
You are replying to this message
Sorry, didn't know about that :D
URL *with* literal character 0: <//email@example.com>/internet_explorer_address_bar_spoofing_test/" rel="nofollow"><http://vbalex.dyndns.org:…ddress_bar_spoofing_test/>
And with an escaped character 0: <//firstname.lastname@example.org>/internet_explorer_address_bar_spoofing_test/" rel="nofollow"><http://vbalex.dyndns.org:…ddress_bar_spoofing_test/>
My observation: It only works as advertised if the character 0 is escaped. If the \0 is raw, the link will bring up the actual site displayed (microsoft.com.)
I'm tired, and probably sounding stupid. Sorry :)