|
Mozilla browser "about:" exploit
|
|
Dec. 09, 2004, 12:09 PM
Post: #4
|
|||
|
|||
Siamesecat Wrote:I was not trying to catch "src=", but "about:<whatever>" exploits. I read somewhere that many of the "about:*" codes can be exploited by malicious code, but had not thought much about it until this demo came along.Where? As you said, the exploit you referred to deals with printing an iframe source. "about:blank" was just an example, it works with "/nicepath/nicename.html" as well (and has been fixed in the nightly builds). See here for a "non-about" crash. Quote:Could a web page query my browser with, for instance, "about:plugins" to find out what plugins I had installed?Pages like "about:mozilla" work only locally, like that "I can see your hard disk!" followed by a "file:///c:/" iframe joke. The security relevant pages are disabled for remote webpages in Mozilla anyway - see here. sidki |
|||
|
« Next Oldest | Next Newest »
|
| Messages In This Thread |
|
[] - Siamesecat - Dec. 08, 2004, 08:08 AM
[] - Siamesecat - Dec. 09, 2004, 06:30 AM
[] - sidki3003 - Dec. 09, 2004 12:09 PM
[] - Siamesecat - Dec. 10, 2004, 07:39 AM
[] - Siamesecat - Dec. 10, 2004, 08:13 AM
[] - Siamesecat - Dec. 12, 2004, 07:21 AM
|

Search
Member List
Calendar
Help





![[-]](images/ONi/collapse.gif)