Re: Konqueror: URL address bar spoofing vulnerabilities

看板Bugtraq作者時間18年前 (2007/08/13 14:39), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Robert Swiecki wrote: > The second one is based on the http URI scheme which allows embedding > user/password parameters into it, i.e. http://user:password@domain.com. > Such parameters can contain whitespaces, so the attack vector is quite > obvious. > > http://alt.swiecki.net/konq3.html > > Tested with Konqueror 3.5.7 on Linux 2.6 This does interesting things to firefox as well. Specifically, it hangs seemingly indefinably (with no cpu utilization). Tested with firefox-2.0.0.6 on Foresight Linux (firefox=/foresight.rpath.org@fl:1-devel//1/2.0.0.6-1-1). smithj -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.4 (GNU/Linux) iD8DBQFGt6KR0e1Yawpq2XMRAptmAJ9YTUDtNKUctdrfPDLGn6sWug/ivwCeIYvE IpsCSHCIHi6dyzWPebwp/wU= =bLFr -----END PGP SIGNATURE-----
文章代碼(AID): #16l_oS00 (Bugtraq)