Date: Tue, 16 Feb 1999 09:46:05 PST From: Georgi Guninski To: BUGTRAQ@netspace.org Subject: Netscape Communicator window spoofing bug There is a bug in Netscape Communicator 3.04,4.06,4.5 Win95 and 4.08 WinNT, which allows "window spoofing". After visiting a hostile page (or clicking a hostile link) a window is opened and its location is a trusted site. However, the content of the window is not that of the original site, but it is supplied by the owner of the page. So, the user is misled he is browising a trusted site, while he is browsing a hostile page and may provide sensitive information, such as credit card number. The bug may be exploited using HTML mail message. It needs Javascript enabled. Workaround: Disable Javascript Demonstration is available at: http://www.nat.bg/~joro/b14.html http://www.whitehats.com/guninski/b14.html This bug is different from the "frame spoofing vulnerability" The code is: -------------------------------
Follow this link to go to www.yahoo.com (or somewhere else) ------------------------------- Note: My web page has moved. Look below for the new URLs. Regards, Georgi Guninski http://www.nat.bg/~joro http://www.whitehats.com/guninski ------------------------------------------------------------------------ Date: Sun, 21 Feb 1999 13:26:20 GMT From: Kirrily 'Skud' Robert To: BUGTRAQ@netspace.org Subject: Re: Netscape Communicator window spoofing bug Frames or not, this bug was discussed in some detail in the O'Reilly book _Web Security and Commerce_ by Garfinkel and Spafford. Since its original publication date is June 1997, I think we can assume that this bug has been known for almost two years. I heartily recommend this book to anyone interested in browser security issues, especially those related to java, javascript, and other such client-side programming. Ref: http://www.oreilly.com/catalog/websec/ K. -- Kirrily 'Skud' Robert - http://netizen.com.au/ Documentation is the castor oil of programming. Managers know it must be good because the programmers hate it so much.