Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Internet Explorer The Internet Bug Microsoft

New IE Bug Hides Real Site Address 683

Norman at Davis writes "ZDNet is running a story on a new security flaw in Microsoft's Internet Explorer which could let hackers use a technique to display a false Web address on a fake site according to an advisory from the Danish security company Secunia. The Danes report that 'the vulnerability is caused due to an input validation error, which can be exploited by including the "%01" URL encoded representation after the username and right before the "@" character in an URL.' PC World reports that 'Microsoft says it is investigating reports of the vulnerability. When that inquiry is complete, the company will take whatever steps it deems necessary, such as issuing a new patch, a spokesperson says.' And for good measure, here's what Google news is covering on it right now."
This discussion has been archived. No new comments can be posted.

New IE Bug Hides Real Site Address

Comments Filter:
  • Link to POC test (Score:5, Informative)

    by Anonymous Coward on Thursday December 11, 2003 @09:40AM (#7688990)
  • The example misuse (Score:4, Informative)

    by trystanu ( 691619 ) on Thursday December 11, 2003 @09:40AM (#7688993) Homepage
    Is pretty compelling (spoofs Microsoft.com):

    http://www.zapthedingbat.com/security/ex01/vun1.ht m
  • A demonstration (Score:4, Informative)

    by karevoll ( 630350 ) on Thursday December 11, 2003 @09:41AM (#7689000) Homepage

    Click here [ZapTheDingBat.com] [zapthedingbat.com] to see an example of how it is done...

    Opera and Mozilla (at least firebird) handles it properly :-)

  • Works fine on IE (Score:2, Informative)

    by nberardi ( 199555 ) * on Thursday December 11, 2003 @09:43AM (#7689010) Homepage
    No bug in my box from some reason. It works fine on my version IE 6.0 on Windows 2000.
  • by rbb ( 18825 ) <remco AT rc6 DOT org> on Thursday December 11, 2003 @09:46AM (#7689036) Homepage
    Why people keep on using Internet Explorer is a mystery to me, as these problems have been solved ages ago in browsers like for example Opera [opera.com]:
    Security warning: you are about to go to an address containing a username:

    username: www.paypal.com
    server: rc6.org

    Are you sure you want to go to this address?
  • IE Mac is fine (Score:5, Informative)

    by wolrahnaes ( 632574 ) <sean.seanharlow@info> on Thursday December 11, 2003 @09:46AM (#7689041) Homepage Journal
    Strangely IE 5.2 on OS X.2 is seemingly immune. Wouldn't the two logically use similar codebases and thus be vulnerable to the same attacks?
  • Re:See also (Score:4, Informative)

    by karevoll ( 630350 ) on Thursday December 11, 2003 @09:48AM (#7689044) Homepage

    The %01 part should come _before_ the @... and no, it is not just as simple as this... the url must also be unescaped..

    See Here [DevGuru] [devguru.com] if you don't know what to 'unescape' means...

    (Yes, this means that it will be difficult pulling this one off over i.e IRC, where special characters don't necessarily show up on other peoples terminals)

  • by nikster ( 462799 ) on Thursday December 11, 2003 @09:51AM (#7689072) Homepage
    click on the test button on this [heise.de] page.... it's quite scary.

    Of course, you have to use Internet Explorer to see it.

    Internet Explorer is usually found under C:\Program Files\Internet Explorer ;)

  • Re:Works fine on IE (Score:3, Informative)

    by karevoll ( 630350 ) on Thursday December 11, 2003 @09:51AM (#7689073) Homepage

    What is your version-number? Mine is 6.0.2800.1106, and I can confirm that its working (infortunately)...

    Have tried some examples? Such as this one? [zapthedingbat.com] [zapthedingbat.com]

  • by leifm ( 641850 ) on Thursday December 11, 2003 @09:53AM (#7689085)
    I'd recommend Firebird over Mozilla. While I still like Moz a lot I've started using Firebird 98% of the time, it integrates with Windows a bit better, it's faster, and the interface is simplier. And over the last year to year and a half almost every site seems to render correctly with Gecko based browsers, leaving only Windows Update and other ActiveX dependent sites needing IE. IE was a good browser in it's day, but MS has let it stagnate pretty much since 4.0. They're going to have to do more than just add pop-ip blocking for me to use it with any regularity again.
  • Re:This bodes ill (Score:5, Informative)

    by Bobulusman ( 467474 ) on Thursday December 11, 2003 @09:59AM (#7689131)
    Actually, although someone will probably prove me wrong, you couldn't do this with a slashdot link. You have to use the unescape command, and I don't see a way to do that with the allowed HTML.

    I'm sure it's main 'use' will be HTML e-mails which lead consumers to fake ebay and paypal sites.
  • by BenjyD ( 316700 ) on Thursday December 11, 2003 @09:59AM (#7689133)
    No it doesn't. The exploit page linked to in the article displays the full URL with Mozilla 1.5 on my Linux system:

    http://www.microsoft.com@zapthedingbat.com/secur it y/ex01/vun2.htm
  • Re:IE Mac is fine (Score:1, Informative)

    by Anonymous Coward on Thursday December 11, 2003 @10:07AM (#7689186)
    Believe it or not, IE for mac (as well as MSN (IE6) for mac) uses ENTIRELY different codebases.

    IE 5.2 for mac was well ahead of IE 5 for windows - in terms of rendering speed, css/dom support, and stability.

    why? i have no frickin' clue.
  • Re:IE Mac is fine (Score:5, Informative)

    by Talthane ( 699885 ) on Thursday December 11, 2003 @10:08AM (#7689195)
    No, the Mac and PC versions of IE have nothing to do with one another beyond a superficial similarity in looks. The Mac version of IE has often been ahead of its bigger brother in terms of standards compliance and suchlike - for example, IE 5.2 does not require the CSS "box model hack" that you have to use to get some sites to render properly in IE 5.5 on Windows. They have a totally different codebase - Microsoft just made use of a name with high brand recognition.
  • by Anonymous Coward on Thursday December 11, 2003 @10:17AM (#7689259)
    This is maybe happening to me. This week, after visiting some adult sites, I noticed that the sponsored links section in google now took up an entire page. There was also a pop-up.
    <P>
    I figured that if google was doing crap like that, there would have been something in the news. I ran my virus checker and my spyware cleaners, found a few things, removed them, and then went back to google. The same thing was happening.
    <P>
    It is a clever trick. The page looks exactly like google and, when you choose the other search pages (2 and above) searches work. However, the selection for 1 no longer links to anything. When you go to other googles overseas or use the direct IP address, google works correctly. On other PC's on my network, google works correctly.
    <P>
    The bogus sponsored links are either to 216.221.138.95 or to something called searchassistant.net. The pop-up that comes up is linked to epsilon.searchassistant.net. Linking to searchassistant.net brings up a page claiming to be under construction and offering a link to uninstall searchassistant spyware. I haven't tried that because I have work stuff to do on this PC and don't have time to reintall Windows or something if that blasts me with more crud.
    <P>
    I dug around through the registry and the C drive and found several odd keys and files referring to google and searchassistant. I removed all I could find without any effect. I'm not an expert so I must have missed stuff. There is also a strange application that keeps appearing on my C drive called msdos.exe. It is not DOS and always restores when I remove it.
    <P>
    These people are scum and should be abused and sanctioned. It is one thing to hit people with popups and another to present fake web-sites. Also, I never allowed anything to download and I know I didn't make a mistake. I'm not THAT much of a newbie. These people are basically virus writers. Also, if you are adult site surfing, never ever go to p***y.com. This is the site that infected my PC with this searchassistant crap.
    <P>
    As I said, I'm not an expert, basically a normal user with enough know-how to be dangerous. If anything I wrote is obvious or stupid, then I apologize ...
  • Re:IE Mac is fine (Score:4, Informative)

    by Deven ( 13090 ) <deven@ties.org> on Thursday December 11, 2003 @10:20AM (#7689279) Homepage
    Wouldn't the two logically use similar codebases and thus be vulnerable to the same attacks?

    You would think so, wouldn't you? No, a separate development team worked on IE for the Mac; the codebases weren't unified at all. From all reports, IE on the Mac was better than IE on Windows in many ways, particularly standards compliance. Go figure!
  • by RFC959 ( 121594 ) on Thursday December 11, 2003 @10:25AM (#7689321) Journal
    The problem is that there are still so many sites that are borken in other browsers. (Well, one of the problems, anyway.) Not necessarily because the other browsers are bad, but because developers assume that everyone is going to have IE, think they should force everyone to use IE, or just don't bother to test at all. Off the top of my head I can think of two sites which are intentionally broken:
    http://www.scps.nyu.edu [nyu.edu] and
    http://www.expensable.com [expensable.com]. (expensable.com, by the way, is an excellent showcase for bad design, but most of it you'd have to log in to see. For example, the main interface is in a popup, and if you have popups blocked, you just can't log in, and it gives you no indication why.) Try going to either of those sites with your User-Agent string set to something unusual. Sure, you and I know how to change that...but for my mom, who can't even figure out how to change her Windows desktop image on her own, that's going to be a deal-breaker.
  • Still.. (Score:3, Informative)

    by Dwedit ( 232252 ) on Thursday December 11, 2003 @10:35AM (#7689414) Homepage
    Even if it's hidden in the address bar, you can do File > Properties to see the full URL.

    And no, this bug won't work on slashdot since slashdot removes the username parts of a URL, and also removes the DOS smileyface character from posts.
  • by jdreed1024 ( 443938 ) on Thursday December 11, 2003 @10:37AM (#7689440)
    The problem is that it looks like it affects them all.

    If I understand what they are saying, if you put a %01 before the @ symbol then the address bar will display one address while going to a different one. Guess what, so does just putting the @ symbol

    http://www.zdnet.com@slashdot.org

    No, no, you're missing the point. Yes, that URL you mentioned will take you to slashdot and not zdnet, fine. But you'll see it in the location bar and know it's a fake. However, with this exploit, if you put a URL encoded ASCII "NUL" (%00) or "SOH" (%01) in the URL, the location bar will not display the @symbol or anything after it. Thus:

    http://www.yahoo.com%01@www.0wnz0red.com/0wn-j00.h tml

    will take people to the "0wn-j00.html" page on 0wnz0red.com, however the location bar will only display:

    http://www.yahoo.com

    Assuming 0wnz0red.com is a well-done forgery, even the most clueful geek would have a really, really, really, hard time telling that he's at anything but yahoo.com. (yeah, yeah, netstat and firewalls and all that, but that's not the point)

    And before you all say it's only %01, it's not - it's %00 as well as %01. Go read the secunia link.

  • by bryhhh ( 317224 ) on Thursday December 11, 2003 @10:53AM (#7689578)
    Actually, I think Finuvir was referring to the general use of '@' in a URL, rather than the use of unescaped %01.

    Seems like a damn fine idea to me. If all browsers already had this functionality, It would have prevented this [bbc.co.uk] from happening.
  • Re:This bodes ill (Score:5, Informative)

    by metlin ( 258108 ) on Thursday December 11, 2003 @10:54AM (#7689588) Journal
    You're correct.

    I even tried various combinations, including a javascript: in the href tag and it did not work -

    <a href="javascript:location.href=unescape('http://ww w.microsoft.com%01@zapthedingbat.com/security/ex01 /vun2.htm')">test</a>

    Not as bad as it could be. Atleast not yet.
  • Re:Works fine on IE (Score:2, Informative)

    by br0ck ( 237309 ) on Thursday December 11, 2003 @11:00AM (#7689644)
    This exploit does NOT rely on Javascript. The zapthedingbat exploit page does indeed rely on script, but just do a slight modification to their script in a local file (remove spaces):

    <script language="javascript">
    document.write(unescape('h ttp://www.microsoft.com%01@zapthedingbat.com/secur ity/ex01/vun2.htm'));
    </script>

    will give you a URL that you can put into an unscripted link something like this, but with the %01 encoded and displayed as a box.

    <a href="http://www.microsoft.com[encoded %01]@zapthedingbat.com/security/ex01/vun2.htm">exp loit</a>
  • Re:Current example. (Score:2, Informative)

    by someguy42 ( 609667 ) on Thursday December 11, 2003 @11:23AM (#7689860)
    Grr...no link....let's try again.

    webpagesthatsuck.com's demo of this exploit [webpagesthatsuck.com]
  • by blazerw11 ( 68928 ) <(moc.toofgib) (ta) (wrezalb)> on Thursday December 11, 2003 @11:26AM (#7689885) Homepage
    This article [securityfocus.com] at securityfocus says IE 6 and possibly earlier versions of IE. No Mozilla, Netscape, Opera, Links, Safari, Konq, Firebird, etc.

  • by CowboyMeal ( 614487 ) <<ude.tir.mula> <ta> <resuahn>> on Thursday December 11, 2003 @11:27AM (#7689900)
    The problem is that it looks like it affects them all.

    That is not the case, if it was, it would be a design flaw in html. This is just a case of different handling of an error condition.

    I saw a post somewhere that said that the vulnerability works with either a ascii 1 or an ascii 0 character before the "@".

    Here are 2 exploit pages that I just created, that just have a link to http://slashdot.org @goatse.cx.

    ASCII 0 [rit.edu]
    ASCII 1 [rit.edu]

    (Below are the browsers I just happen to have installed)

    IE6 for windows (for sake of having a control):
    0 brings you to goatse.cx with http://goatse.cx in the address bar
    1 brings you to goatse.cx with http://slashdot.org in the address bar

    Opera 7.23 for windows and Opera 7.11 for FreeBSD:
    0 brings you to slashdot.org with http://slashdot.org in the address bar
    1 brings you to goatse.cx with http://slashdot.org^@goatse.cx/ in the address bar, where ^ is ASCII 1.
    Note: Opera brought up a dialog box warning you that the link was to a site with a username in the URL on the ASCII 1 link.

    Mozilla Firebird 0.7 for windows and Mozilla 1.5 for Windows:
    0 brings you to slashdot.org with http://slashdot.org in the address bar
    1 brings you to goatse.cx with http://slashdot.org%01@goatse.cx/ in the address bar

    So of the browsers tested, the vulnerability only works in IE, and only for ASCII 1.
  • by sacrilicious ( 316896 ) <qbgfynfu.opt@recursor.net> on Thursday December 11, 2003 @11:35AM (#7689977) Homepage
    Would be nice to have listed which versions were stated to be affected. I have just tested:
    • Win IE 6.0
    • Mac IE 1.5
    • Win Mozilla 1.4.1
    • Mac Mozilla 1.4
    The only one affected was Win IE.

    If any Mozilla versions later than 1.4.1 were to be affected, I'm willing to bet the Mozilla release would be patched within a day, whereas Microsoft would take a minimum of two weeks and a max of maybe never.

  • by Anml4ixoye ( 264762 ) * on Thursday December 11, 2003 @11:39AM (#7690005) Homepage
    Is this going to break anything useful?

    Yes, things like FTP logins rely on that. URLs are subsets of URIs which have a lot more useful things.

    For example, if you need to go to a FTP site that has a login, you can type in your address bar:

    ftp://user:pass@ftp.mysite.com

    That will automatically log you in with your user name and password. You could also do just:

    user@ftp.mysite.com

    And it will prompt you for your password

  • by Anonymous Coward on Thursday December 11, 2003 @11:43AM (#7690042)
    I don't have Mozilla 1.5 on my machine here, but 1.3 is vulnerable to a "%00" before the "@" also. However, Mozilla is not -as- vulnerable as IE.

    IE displays href="http://www.yahoo.com%00@www.hotmail.com" as www.yahoo.com when it is actually a link to www.hotmail.com in the status bar at the bottom of the browser and it also shows that link as one to "http://www.yahoo.com" when you view the properties of the link. Unfortunately I can't demonstrate this in this post as I intended as Slashdot reoves everything before the www.hotmail.com.

    Mozilla 1.3 also shows the link as being to www.yahoo.com although it is actually to www.hotmail.com, although Mozilla 1.3 DOES correctly show the link properties as "http://www.yahoo.com%00@www.hotmail.com".

    Consequently, Mozilla also needs to fix their browser, although only in one of the two ways that IE needs to fix their browser.
  • by le_jfs ( 627582 ) on Thursday December 11, 2003 @11:46AM (#7690067) Journal
    Assuming 0wnz0red.com is a well-done forgery, even the most clueful geek would have a really, really, really, hard time telling that he's at anything but yahoo.com. (yeah, yeah, netstat and firewalls and all that, but that's not the point)

    First step to be the 'most clueful geek':

    Don't use IE.
  • Re:Works fine on IE (Score:3, Informative)

    by djmurdoch ( 306849 ) on Thursday December 11, 2003 @11:58AM (#7690176)
    Please note however that there's a related bug described here [slashdot.org] that fools the status bar. So even a careful user could be sucked in.

    The new version doesn't fool the address bar, but I wouldn't be surprised if there's some combination of characters that does.
  • Re:Cert? (Score:3, Informative)

    by Derek Pomery ( 2028 ) on Thursday December 11, 2003 @12:01PM (#7690208)
    Like it would be so hard for a group with dubious credentials to acquire a cert. Browsers don't prompt usually so long as the cert is up to date, and from an official cert authority.
    Who's going to inspect and notice it wasn't issued to the right corporation?
    Well, hopefully any paranoid IE user, for now.
  • Re:Similar IE bug (Score:1, Informative)

    by Anonymous Coward on Thursday December 11, 2003 @12:03PM (#7690223)
    If you combine the two of these, it will fail in the status bar and also in the address bar.
    <a href="https://my name is green%00&#1;@paypal.com">click me</a>
    Slashdot won't display the unescaped character, but basically you add the escaped %00 and then the unescaped %01 to a link.

    Of note, you will get a security warning above because "paypal.com" does not match "my name is green"

    az@blizzle
  • by burgburgburg ( 574866 ) <splisken06NO@SPAMemail.com> on Thursday December 11, 2003 @12:13PM (#7690337)
    Firebird 0.7 DOES show the spoofed address in the status bar, but with an odd character after the URL. However, it shows the real, spoofed URL in the address bar.
  • by HeghmoH ( 13204 ) on Thursday December 11, 2003 @12:19PM (#7690406) Homepage Journal
    It's covered in RFC 1738 [ohio-state.edu]. Look for section 3.1 Common Internet Scheme Syntax.

    Basically, it allows you to specify a username and possibly a password as part of a URL. http://w:x@y.com says to connect to y.com with username w, password x. The URL http://w@x.com means to connect to x.com with username w. This is not in particularly common use for HTTP, but it can be useful for sites that use HTTP authentication.

    Web servers ignore the username and password if you connect to a page that doesn't require authentication, so for most sites, everything before the @ is simply ignored.

    So this really is part of a standard, and it exists for a good reason. It's not a redirection at all, but simply a part of the URL standard that isn't used often enough for people to know what it means. The whole spoofing this is a completely unintended consequence of that.
  • by Anonymous Coward on Thursday December 11, 2003 @12:24PM (#7690463)
    These are 2 distinct and different bugs.

    "%00" will hide the link in the tooltip and the status bar on both Mozilla and IE. Although Mozilla will correctly display the entire link in the link properties where IE only displays up to the "%00" here also.

    "%01" will not hide the link in the tooltip or the status bar in either Mozilla or IE, but it will make the location bar only show up to the "%01" in IE after you click on the link.
  • Re:This bodes ill (Score:2, Informative)

    by glpierce ( 731733 ) on Thursday December 11, 2003 @01:04PM (#7690849)
    Someone using a workstation at an office or computer lab doesn't usually have control over which applications they can use. Not only are installations, etc. restricted, but even if they weren't, it wouldn't be very intelligent to install new software every single time you want to spend 2 minutes on the web, considering the difference isn't huge over small periods of time (tabbed browsing is great, but you can surf the web without it).
  • by steve-qc ( 691442 ) on Thursday December 11, 2003 @01:40PM (#7691149)
    Spoofing the status bar is no big deal. Javascript has always allowed this.

    It quite common for webmasters to use the trick with external links that get redirected from a "click-through counter" page before sending you off to the actualy URL.
  • by Ubergrendle ( 531719 ) on Thursday December 11, 2003 @02:06PM (#7691411) Journal
    I work for a bank in their internet division. We list 'supported' browsers, but don't make any recommendations. Why? Because we don't want our telephone representatives providing tech support for our 5 million customers. We tried recommending Netscape about 4 or 5 years ago... "NEVER AGAIN" is our mantra.

    Yes, it sucks. But we're a business and we can't lead technology change. Just be thankful we don't use .asp, Active X, or flash on our site. :)
  • by InfoSec ( 208475 ) on Thursday December 11, 2003 @02:45PM (#7691853) Homepage
    That it doesn't fool the security zones in IE. If you have a site in your "Trusted Sites" zone, and you try to spoof that site using the mentioned vulnerability, the Address Bar shows false, but the Zone is not fooled. Thank heavens for small miracles.
  • by Anonymous Coward on Thursday December 11, 2003 @03:42PM (#7692433)
    > I've been recommending to all my friends and family to start using Mozilla

    Actually, I have just tested this on Mozilla Firebird 0.7. Partialy it is also vulnerable. Once you click on the link you will see complete fake URL (in case of their test http://www.microsoft.com%01%00@secunia.com/interne t_explorer_address_bar_spoofing_test/)
    but in the status bar I only could see http://www.microsoft.com<some_unreadable_character > and that's it.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...