[32759] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Internet Explorer URL parsing vulnerability

daemon@ATHENA.MIT.EDU (Eric \"MightyE\" Stevens)
Tue Dec 9 19:44:31 2003

Message-ID: <3FD623CA.3040608@mightye.org>
Date: Tue, 09 Dec 2003 14:34:34 -0500
From: "Eric \"MightyE\" Stevens" <trash@mightye.org>
MIME-Version: 1.0
To: bugtraq@securityfocus.com
Cc: soulshok@hippie.dk
In-Reply-To: <3FD62323.8020606@mightye.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

IE 6.0.2800.1106.xpsp2.030422-1633 with all the latest updates (SP1; 
Q822925; Q330994; Q828750; Q824145) is vulnerable.  Works like a charm.

-Eric "MightyE" Stevens
http://lotgd.net

soulshok@hippie.dk wrote:

>In-Reply-To: <20031209144416.31613.qmail@sf-www2-symnsj.securityfocus.com>
>
>  
>
>># Exploit ##########
>>By opening a window using the http://user@domain nomenclature an attacker can hide the real location of the page by including a 0x01 character after the "@" character.
>>Internet Explorer doesn't display the rest of the URL making the page appear to be at a different domain. 
>>    
>>
>...
>  
>
>># Tested ##########
>>Internet Explorer
>>Version 6.0.2800.1106C0
>>Updates: SP1, Q810847, Q810351, Q822925, Q330994, Q828750, Q824145
>>
>>    
>>
>Internet Explorer 5.00.3700.1000 (SP4, Q824145) doesn't seem to be vunlerable to this.
>
>  
>

home help back first fref pref prev next nref lref last post