[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] New (19.10.05) MS-IE Url Spoofing bug (byK-Gen)
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] New (19.10.05) MS-IE Url Spoofing bug (byK-Gen)
- From: Jake Cole <jakecoleus@xxxxxxxxx>
- Date: Thu, 20 Oct 2005 12:33:02 -0700 (PDT)
In "Billy's" defense, this is expected in most
JavaScript-enabled browsers.
Here's a Firefox version:
<a href="http://microsoft.com"
onClick="window.setTimeout('document.write(unescape(\'%3cscript%3ewindow.location=%27http://google.com%27%3c/script%3e\'))')">Microsoft</a>
-----Original Message-----
From: full-disclosure-bounces@xxxxxxxxxxxxxxxxx
[mailto:full-disclosure-bounces@xxxxxxxxxxxxxxxxx] On
Behalf Of Nick FitzGerald
Sent: Thursday, October 20, 2005 12:08 PM
To: full-disclosure@xxxxxxxxxxxxxxxxx
Subject: [BULK] - Re: [Full-disclosure] New (19.10.05)
MS-IE Url Spoofing bug (byK-Gen).
Mike Camden wrote:
> I thought this was by design since you may have a
known url to go to but
> only after some form of validation has been passed.
IFF that is the case, then it is an extraordinarily
brain-dead design,
as it breaks the very critical "rule" that you should
NOT surprise the
user. A URL link that is shown in the interface to go
one place, but
which goes somewhere else is fundamentally broken
under that rule.
If this is by design, then it's another case of a
feature that breaks
Billy's admonition that security is to trump features,
so should be
fixed.
Regards,
Nick FitzGerald
__________________________________
Yahoo! Mail - PC Magazine Editors' Choice 2005
http://mail.yahoo.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/