Как опубликовать НОВОСТЬ на сайте operaman.ru - читайте здесь
Mongoose
|
Moderator
|
|
|
Зарегистр: 21/05/2003
|
Сообщений: 1754
|
Из: Київ, Ненька Україна
|
|
Не долго мызыка играла... Ждём 7.53.
08/07/2004 19:34
|
|
|
Opera Browser Address Bar Spoofing Vulnerability
Secunia Advisory: SA12028 Release Date: 2004-07-08 Critical: Moderately critical Impact: Spoofing Where: From remote Software: Opera 5.x, Opera 6.x, Opera 7.x
Description: bitlance winter has discovered a vulnerability in the Opera browser, which potentially can be exploited by malicious people to conduct phishing attacks against a user.
The problem is that information in the address bar is changed before properly loading a page. This can e.g. be exploited via a specially crafted HTML document, which does the following:
1) Loads an HTML document with an "unOnload" event handler in the <BODY> tag, which is set to cause an infinite loop when the page is left. 2) Displays an arbitrary (potentially malicious) website in an inline frame ("<iframe>"), which at the same time sets an "onLoad" event handler to visit an arbitrary (potentially trusted) website.
Successful exploitation causes the browser to never load the new, and potentially trusted, website but still show its URI in the address bar.
The vulnerability has been confirmed in version 7.52 for Windows. Other versions and platforms may also be affected.
This is a variant of the following issues: SA11901 SA11532
Операции над сообщением:
|
|
0 зарег. и 9 анонимные пользователи просматривают этот форум.
Модератор: Ilya, van_grieg, Angolier, Pechkin
|
Разрешения
Вы не можете создать новую тему
Вы не можете отвечать в теме
HTML запрещен
UBBCode разрешен
|
Рейтинг:
Thread views: 36350
|
|
|
|
|
© 2000-2002. Николай Ковальчук - All rights reserved
|
|