Mozilla Foundation Security Advisory 2009-44
Location bar and SSL indicator spoofing via window.open() on invalid URL
- Announced
- August 3, 2009
- Reporter
- Juan Pablo Lopez Yacubian
- Impact
- Moderate
- Products
- Firefox
- Fixed in
-
- Firefox 3.0.13
- Firefox 3.5.2
Description
Security researcher Juan Pablo Lopez Yacubian
reported that an attacker could call window.open()
on an
invalid URL which looks similar to a legitimate URL and then
use document.write()
to place content within the new
document, appearing to have come from the spoofed location.
Additionally, if the spoofed document was created by a document with a
valid SSL certificate, the SSL indicators would be carried over into
the spoofed document. An attacker could use these issues to display
misleading location and SSL information for a malicious web page.