Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 85230 - net-www/mozilla: "Save Link Target As..." Status Bar Spoofing Weakness
Summary: net-www/mozilla: "Save Link Target As..." Status Bar Spoofing Weakness
Status: RESOLVED DUPLICATE of bug 85229
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/14568/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-03-14 09:11 UTC by Jean-François Brunette (RETIRED)
Modified: 2005-07-17 13:06 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jean-François Brunette (RETIRED) gentoo-dev 2005-03-14 09:11:38 UTC
Description:
bitlance winter has discovered a weakness in Mozilla, which can be exploited by malicious people to trick users into saving malicious files by obfuscating URLs.

The status bar cannot be manipulated via script code in the default settings. However, it is still possible to display an incorrect URL in the status bar when hovering the mouse over a link, right clicking, and choosing "Save Link Target As...".

This can be exploited by including a nested link in a table inside a link.

Example:
<a href="[TRUSTED_URL]">
<table><tr><td>
<a href="[MALICIOUS_URL]">download
</a>
</td></tr></table>
</a>

The weakness has been confirmed in version 1.7.5. Other versions may also be affected.

Solution:
Never save files via untrusted sources.

Other References:
SA13015:
http://secunia.com/advisories/13015/
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-03-15 02:12:54 UTC
Regrouping, sorry for the noise...

*** This bug has been marked as a duplicate of 85229 ***