Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Security Vulnerability in multiple Browsers for both PCs and Macs
Secunia ^ | 6/21/2005 | Secunia

Posted on 06/25/2005 2:58:40 PM PDT by Swordmaker

Secunia Research has discovered a vulnerability in various browsers, which can be exploited by malicious web sites to spoof dialog boxes.

The problem is that JavaScript dialog boxes do not display or include their origin, which allows a new window to open e.g. a prompt dialog box, which appears to be from a trusted site.

Please use the test page, to see an example of how this vulnerability can be exploited, and also to determine whether or not your browser is vulnerable.


Secunia illustration of Dialog Origin vulnerability

This illustration may be used freely in news articles and web sites as long as Secunia.com is referenced as the source and the illustration links back to this page.


TOPICS: Computers/Internet
KEYWORDS: secunia; security
According to Secunia, this is a only a mild vulnerability. They report that it exists in Safari 1.x, as well as in various other PC and Windows browsers including Internet Explorer, FireFox, Mozilla and Camino.

On testng I found it also exists in Safari 2.0 in Mac OSX.4.1.



You are vulnerable, if a JavaScript dialog box appears in front of the Google.com web site without displaying information about its origin.

You are not vulnerable, if you do not experience the above behaviour.



What should you do?

Please view the appropriate Secunia advisory for information about how you can fix or mitigate the impact of this vulnerability. The Secunia advisories will be updated when the vendors issue patches.

View the Secunia advisory regarding your browser:
- Internet Explorer for Mac
- Internet Explorer
- Opera
- Safari
- iCab
- Mozilla / FireFox / Camino




1 posted on 06/25/2005 2:58:41 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Bush2000; antiRepublicrat; Action-America; eno_; Glenn; bentfeather; BigFinn; Brian Allen; byset; ..
Security warning ping... both PCs and Macs are affected!!!

PING!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 06/25/2005 3:00:13 PM PDT by Swordmaker (tagline now open, please ring bell.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Good thing I use a Maxthon browser. < \\sarcasm >
3 posted on 06/25/2005 3:03:13 PM PDT by jdm (The answer to the extra credit question on a Columbia U exam is always choice C: "Bush's Fault.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Thanks.

It suggested for me.....Solution: Do not browse untrusted web sites while browsing trusted sites.

And that's just good common sense.


4 posted on 06/25/2005 3:07:49 PM PDT by TheOtherOne (I often sacrifice my spelling on the alter of speed™)
[ Post Reply | Private Reply | To 2 | View Replies]

To: jdm
Did you try it with the test? The vulnerability seems to me to have more to do with the way HTML, Java, and the Internet work than with a particular browser.

Try the test and let us know... if your browser is not vulnerable, I am sure that PC users would want to know about a safer alternative.

5 posted on 06/25/2005 3:08:30 PM PDT by Swordmaker (tagline now open, please ring bell.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: TheOtherOne
Solution: Do not browse untrusted web sites while browsing trusted sites.

Quite frankly, I think that may be the only solution to this particular vulnerability.

6 posted on 06/25/2005 3:09:39 PM PDT by Swordmaker (tagline now open, please ring bell.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker

I checked mine out and a box came up asking for a pass work string. I did not entering anything in the field box.

I am using IE.


7 posted on 06/25/2005 4:16:47 PM PDT by Soaring Feather
[ Post Reply | Private Reply | To 2 | View Replies]

To: bentfeather

entering=I did not enter anything.


8 posted on 06/25/2005 4:17:35 PM PDT by Soaring Feather
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker

Something popped up when I did the test, but only for a split second, my spyware blocked it.


9 posted on 06/25/2005 6:21:53 PM PDT by gidget7 (Get GLSEN out of our schools!!!!!!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: TheOtherOne
Well, it's official... Microsoft claims it isn't a flaw or vulnerability, it's a feature!


IE pop-up spoof won't get patch
Published: June 23, 2005, 4:35 PM PDT
By Joris Evers
Staff Writer, CNET News.com

Microsoft does not plan to update Internet Explorer to prevent a spoofing attack that could trick users into giving out personal information to hackers.

In the attack, JavaScript is used to display a pop-up window in front of a trusted Web site. The pop-up appears to be part of the legitimate site, but actually is linked to a different, malicious site. A user might be fooled into sending personal information to the scammers.

Although the pop-ups could be used by attackers, overlaying multiple windows in a Web browser is a feature, not a vulnerability, according to an advisory posted Tuesday on Microsoft's TechNet Web site.

"This is an example of how current standard Web browser functionality could be used in phishing attempts," Microsoft said in the advisory.

Phishing is a prevalent type of online fraud that attempts to steal sensitive information such as usernames, passwords and credit card numbers. The schemes typically combine spam e-mail and fraudulent Web pages that look like legitimate sites.

Earlier this week, security monitoring company Secunia warned of the browser problem and rated it "less critical." The issue affects most major browsers, Secunia said.

The problem is that JavaScript dialog boxes do not display or include their origin. For an attack to occur, a user would have to visit a malicious Web site or click on a link before going to a trusted site, such as that of a bank. The attacker could then overlay part of the trusted site with a window asking for data such as a user name and password. Information entered would go to the attacker, instead of the bank.

Firefox developers at the Mozilla Foundation have been making moves to combat this kind of attack. In April, a patch was developed that allows people to block Java and Flash-based pop-ups unless they came from trusted sites.

Opera has said that its latest browser, 8.01, would display the pop-up's origin, letting a user inspect its URL to see if it came from a trusted site.

10 posted on 06/25/2005 9:20:46 PM PDT by Swordmaker (tagline now open, please ring bell.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker

Swordmaker -- I'm on Pather 10.3.9 -- how do I get rid of this bug on my computer? It is driving me nuts that I've got it!


11 posted on 07/08/2005 10:29:38 AM PDT by Californiajones ("The apprehension of beauty is the cure for apathy" - Thomas Aquinas)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Californiajones

The easiest way to avoid this "feature" is to close ALL browser windows and wait about 10 seconds before opening a fresh blank window and navigating to any secure site such as your Bank, eBay, etc.


12 posted on 07/08/2005 6:53:00 PM PDT by Swordmaker (tagline now open, please ring bell.)
[ Post Reply | Private Reply | To 11 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson