Bugtraq mailing list archives
Re: Konqueror: URL address bar spoofing vulnerabilities
From: Jonathan Smith <smithj () rpath com>
Date: Mon, 06 Aug 2007 18:37:05 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Robert Swiecki wrote:
The second one is based on the http URI scheme which allows embedding user/password parameters into it, i.e. http://user:password () domain com. Such parameters can contain whitespaces, so the attack vector is quite obvious. http://alt.swiecki.net/konq3.html Tested with Konqueror 3.5.7 on Linux 2.6
This does interesting things to firefox as well. Specifically, it hangs seemingly indefinably (with no cpu utilization). Tested with firefox-2.0.0.6 on Foresight Linux (firefox=/foresight.rpath.org@fl:1-devel//1/2.0.0.6-1-1). smithj -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.4 (GNU/Linux) iD8DBQFGt6KR0e1Yawpq2XMRAptmAJ9YTUDtNKUctdrfPDLGn6sWug/ivwCeIYvE IpsCSHCIHi6dyzWPebwp/wU= =bLFr -----END PGP SIGNATURE-----
Current thread:
- Konqueror: URL address bar spoofing vulnerabilities Robert Swiecki (Aug 06)
- Re: Konqueror: URL address bar spoofing vulnerabilities paraw (Aug 07)
- Re: [Full-disclosure] Konqueror: URL address bar spoofing vulnerabilities Robert Swiecki (Aug 07)
- Re: [Full-disclosure] Konqueror: URL address bar spoofing vulnerabilities Patrick Nagel (Aug 07)
- Re: [Full-disclosure] Konqueror: URL address bar spoofing vulnerabilities Robert Swiecki (Aug 07)
- Re: Konqueror: URL address bar spoofing vulnerabilities Jonathan Smith (Aug 07)
- Re: [Full-disclosure] Konqueror: URL address bar spoofing vulnerabilities Jonathan Smith (Aug 07)
- Re: Konqueror: URL address bar spoofing vulnerabilities paraw (Aug 07)