[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Firefox focus stealing vulnerability (possibly other browsers)
- To: "pdp (architect)" <pdp.gnucitizen@xxxxxxxxxxxxxx>
- Subject: Re: [Full-disclosure] Firefox focus stealing vulnerability (possibly other browsers)
- From: Michal Zalewski <lcamtuf@xxxxxxxxxxxx>
- Date: Sun, 11 Feb 2007 22:26:11 +0100 (CET)
On Sun, 11 Feb 2007, pdp (architect) wrote:
> here is an idea... we can combine both techniques into a single
> attack... the hardest part of your hack is to force the user to type
> :// plus several other /
Actually, MSIE doesn't require drive specification in the filename, and
will probably accept relative paths as well (so you might not need \
either when picking files from the desktop or 'my documents' or whatnot).
Firefox won't settle for a path without drive specification (but it will
accept SMB requests ;-). On *nix systems, of course, aiming /etc/passwd is
easier than C:\whatever.
The problem with intercepting address bar input is that you can't echo the
entered text back there without unloading the current document and its
scripts; in my examples, I tried to make sure that it's hard for the user
to notice that his input is not going where it should (in MSIE example,
this includes simulation of a blinking cursor).
/mz
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/