Bugtraq mailing list archives
Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability
From: <sandrijeski () yahoo com>
Date: 27 May 2004 09:53:33 -0000
In-Reply-To: <40A90108.9000301 () kurczaba com> I can't see this as vulnerability because its legal code I do something similar without using image map for my site to hide the affiliate tracking code. This is the code: <a onmouseover="window.status='http://www.the-url-you-see.com;return true" title="The Link" onmouseout="window.status='Whatever-you-like-here';return true" href='http://www.some-other-url.com'>The link</a> living example: http://lotdcrew.org/drunkteam_new/page/affiliates.php ------------------------------------------------
Received: (qmail 26354 invoked from network); 17 May 2004 18:17:56 -0000 Received: from outgoing.securityfocus.com (HELO outgoing3.securityfocus.com) (205.206.231.27) by mail.securityfocus.com with SMTP; 17 May 2004 18:17:56 -0000 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id B52342371D4; Mon, 17 May 2004 20:13:15 -0600 (MDT) Mailing-List: contact bugtraq-help () securityfocus com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq () securityfocus com> List-Help: <mailto:bugtraq-help () securityfocus com> List-Unsubscribe: <mailto:bugtraq-unsubscribe () securityfocus com> List-Subscribe: <mailto:bugtraq-subscribe () securityfocus com> Delivered-To: mailing list bugtraq () securityfocus com Delivered-To: moderator for bugtraq () securityfocus com Received: (qmail 11770 invoked from network); 17 May 2004 12:00:16 -0000 Message-ID: <40A90108.9000301 () kurczaba com> Date: Mon, 17 May 2004 14:14:32 -0400 From: Kurczaba Associates advisories <advisories () kurczaba com> User-Agent: Mozilla Thunderbird 0.6 (Windows/20040502) X-Accept-Language: en-us, en MIME-Version: 1.0 To: bugtraq () securityfocus com Subject: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Microsoft Internet Explorer ImageMap URL Spoof Vulnerability http://www.kurczaba.com/securityadvisories/0405132.htm ------------------------------------------------------------- Vulnerability ID Number: 0405132 Overview: A vulnerability has been found in Microsoft Internet Explorer. A specially coded ImageMap can be used to spoof the URL displayed in the lower, left hand corner of the browser. Vendor: Microsoft (http://www.microsoft.com) Affected Systems/Configuration: The versions affected by this vulnerability are Microsoft Internet Explorer 5 and 6. Vulnerability/Exploit: An ImageMap can be used to spoof the URL displayed in the lower, left hand of the browser. View the "Proof of Concept" example for details. Workaround: None so far. Proof of Concept: http://www.kurczaba.com/securityadvisories/0405132poc.htm Date Discovered: May 13, 2004 Severity: High Credit: Paul Kurczaba Kurczaba Associates http://www.kurczaba.com/
Current thread:
- Microsoft Internet Explorer ImageMap URL Spoof Vulnerability Kurczaba Associates advisories (May 17)
- <Possible follow-ups>
- RE: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability Drew Copley (May 17)
- Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability thegeekmeister (May 17)
- Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability Jan Kluka (May 18)
- Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability sandrijeski (May 27)
- Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability Robert J Taylor (May 31)
- Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability Valdis . Kletnieks (May 31)
- Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability Peter Pentchev (May 31)
- Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability http-equiv () excite com (May 27)