[32759] in bugtraq
Re: Internet Explorer URL parsing vulnerability
daemon@ATHENA.MIT.EDU (Eric \"MightyE\" Stevens)
Tue Dec 9 19:44:31 2003
Message-ID: <3FD623CA.3040608@mightye.org>
Date: Tue, 09 Dec 2003 14:34:34 -0500
From: "Eric \"MightyE\" Stevens" <trash@mightye.org>
MIME-Version: 1.0
To: bugtraq@securityfocus.com
Cc: soulshok@hippie.dk
In-Reply-To: <3FD62323.8020606@mightye.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
IE 6.0.2800.1106.xpsp2.030422-1633 with all the latest updates (SP1;
Q822925; Q330994; Q828750; Q824145) is vulnerable. Works like a charm.
-Eric "MightyE" Stevens
http://lotgd.net
soulshok@hippie.dk wrote:
>In-Reply-To: <20031209144416.31613.qmail@sf-www2-symnsj.securityfocus.com>
>
>
>
>># Exploit ##########
>>By opening a window using the http://user@domain nomenclature an attacker can hide the real location of the page by including a 0x01 character after the "@" character.
>>Internet Explorer doesn't display the rest of the URL making the page appear to be at a different domain.
>>
>>
>...
>
>
>># Tested ##########
>>Internet Explorer
>>Version 6.0.2800.1106C0
>>Updates: SP1, Q810847, Q810351, Q822925, Q330994, Q828750, Q824145
>>
>>
>>
>Internet Explorer 5.00.3700.1000 (SP4, Q824145) doesn't seem to be vunlerable to this.
>
>
>