Bugtraq mailing list archives
Re: Internet Explorer URL parsing vulnerability
From: <soulshok () hippie dk>
Date: 9 Dec 2003 17:19:57 -0000
In-Reply-To: <20031209144416.31613.qmail () sf-www2-symnsj securityfocus com>
# Exploit ########## By opening a window using the http://user@domain nomenclature an attacker can hide the real location of the page by including a 0x01 character after the "@" character. Internet Explorer doesn't display the rest of the URL making the page appear to be at a different domain.
...
# Tested ########## Internet Explorer Version 6.0.2800.1106C0 Updates: SP1, Q810847, Q810351, Q822925, Q330994, Q828750, Q824145
Internet Explorer 5.00.3700.1000 (SP4, Q824145) doesn't seem to be vunlerable to this.
Current thread:
- Internet Explorer URL parsing vulnerability bugtraq (Dec 09)
- Re: Internet Explorer URL parsing vulnerability Nick FitzGerald (Dec 10)
- Re: Internet Explorer URL parsing vulnerability nesumin (Dec 23)
- <Possible follow-ups>
- Re: Internet Explorer URL parsing vulnerability soulshok (Dec 09)
- Message not available
- Re: Internet Explorer URL parsing vulnerability Eric "MightyE" Stevens (Dec 09)
- Message not available
- Internet Explorer URL parsing vulnerability John W. Noerenberg II (Dec 09)
- Re: Internet Explorer URL parsing vulnerability Pedro Castro (Dec 10)
- Re: Internet Explorer URL parsing vulnerability William Stockall (Dec 10)
- Re: Internet Explorer URL parsing vulnerability Andreas Plesner Jacobsen (Dec 10)
- Re: Internet Explorer URL parsing vulnerability Charles Richmond (Dec 11)
- Re: Internet Explorer URL parsing vulnerability Tiago Pierezan Camargo (Dec 10)
- Re: Internet Explorer URL parsing vulnerability Pedro Castro (Dec 10)