Forum Thread: Internet Explorer URL Spoofing Vulnerability

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
Internet Explorer URL Spoofing Vulnerability

Secunia Internet Explorer URL Spoofing Vulnerability
Secunia Official 26th Nov, 2010 02:17
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
A vulnerability has been identified in Internet Explorer, which can be exploited by malicious people to display a fake URL in the address and status bars.

The vulnerability is caused due to an input validation error, which can be exploited by including the "%01" and "%00" URL encoded representations after the username and right before the "@" character in an URL.

Successful exploitation allows a malicious person to display an arbitrary FQDN (Fully Qualified Domain Name) in the address and status bars, which is different from the actual location of the page.

This can be exploited to trick users into divulging sensitive information or download and execute malware on their systems, because they trust the faked domain in the two bars.

Example displaying only "http://www.trusted_site.com" in the two bars when the real domain is "malicious_site.com":
http://www.trusted_site.com%01%00@malicious_site.co m/malicious.html

A test is available at:
http://www.secunia.com/internet_explorer_address_b...

The vulnerability has been confirmed in version 6.0, and version 5.x is also affected according to Microsoft's knowledge base article.

NOTE: This vulnerability is currently being exploited on the Internet via scam emails!

WSBOBO

RE: Internet Explorer URL Spoofing Vulnerability
[+]
This reply has been minimised due to a negative Relevancy Score.