IE 7 Flaw Could Help Phishers – Error Message Processing


Ah another way for phishers and people wanting to steal login credentials to con IE7 users.

Yet another reason to use Firefox or Opera?

Not saying these browsers are perfect…but look at the amount of problems Internet Exploder Explorer has had.

The flaw lies in the way IE7 processes a locally stored HTML error message page that is typically shown when the user cancels the loading of a Web page, said Aviv Raff, a security researcher based in Israel.

The error message tells the user that “navigation to the Web page was canceled,” and offers the user the opportunity to “refresh the page.” If the refresh link is clicked, IE can be tricked into displaying the wrong Web address for a page. Raff has published proof of concept code that shows how IE can be made to display a Web page on his Web site as if it is from the cnn.com domain.

I’m not sure if any phishers would go to this length to try and con people into visiting their sites, but with some of the creative things they’ve been coming up with lately, it wouldn’t surprise me!

This flaw could be exploited by phishers who want to make their spoofed Web sites appear legitimate, Raff said.

“I can inject a script that will display anything I want in the page when the user clicks the ‘refresh’ link,” he said via instant message. “Combining this with the design flaw, an attacker can render in the browser whatever he wants with whatever URL he wants in the address bar.”

This type of bug is known as a cross-site scripting vulnerability. It affects IE 7 on Vista and Windows XP, Raff added.

Vista is vulnerable too, so be careful. And don’t use IE!

Yes this article was originally published about a month ago, we know that….thanks.

Source: Network World

Posted in: Exploits/Vulnerabilities, Phishing, Windows Hacking

, , , ,


Latest Posts:


Axiom - Pen-Testing Server For Collecting Bug Bounties Axiom – Pen-Testing Server For Collecting Bug Bounties
Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty, basically a pen-testing server out of the box with 1-line.
Quasar RAT - Windows Remote Administration Tool Quasar RAT – Windows Remote Administration Tool
Quasar is a fast and light-weight Windows remote administration tool coded in C#. Used for user support through day-to-day administrative work to monitoring.
Pingcastle - Active Directory Security Assessment Tool Pingcastle – Active Directory Security Assessment Tool
PingCastle is a Active Directory Security Assessment Tool designed to quickly assess the Active Directory security level based on a risk and maturity framework.
Second Order - Subdomain Takeover Scanner Tool Second Order – Subdomain Takeover Scanner Tool
Second Order Subdomain Takeover Scanner Tool scans web apps for second-order subdomain takeover by crawling the application and collecting URLs (and other data)
Binwalk - Firmware Security Analysis & Extraction Tool Binwalk – Firmware Security Analysis & Extraction Tool
Binwalk is a fast and easy to use Python-based firmware security analysis tool that allows for firmware analysis, reverse engineering & extracting of firmware.
zBang - Privileged Account Threat Detection Tool zBang – Privileged Account Threat Detection Tool
zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations & red teams can use it to identify attack vectors


Comments are closed.