Introduction:
In this paper, I want to represent a method for performing Cross Site URL Hijacking (which we can call XSUH) by using the error object of Mozilla Firefox. XSUH attack is used to steal another website URL. This URL can show the client’s situation on that website, and it can contain confidential parameters such as session ID as well. There is another useful article with a similar purpose but with a different approach which is “XSHM” article of CHECKMARX1, and reading this article is highly recommended to you as well.
As you might know, scripts error handling in Mozilla Firefox is quite useful for the developers as it can show the exact source of an error with some useful information. Now, this functionality can be misused to divulge the destination URL after the redirections (XSUH attack) which can lead to condition leakage or stealing some important parameters from the URL.
Download PDF
Volut-ID | World News Articles
All news of interest and can provide an info for you, and so can assist in the search for new news.
About news gadgets, mobile phones
info about the latest mobile phone, from news, features, and the most mobile phone models in search of the world.
Cross Site URL Hijacking by using Error Object in Mozilla Firefox.
Related Post
Browser
- Nuf-Fuzzer v.0.1 Pre-release
- Google Chrome Pwned
- Google Chrome Pwned
- Mozilla Firefox Internals & Attack Strategies
- Mozilla Firefox Internals & Attack Strategies
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- Leaking browsing history via user interaction and side channel attacks
- Leaking browsing history via user interaction and side channel attacks
- Comitari : Web Protection Suite
- Comitari : Web Protection Suite
- Critical vulnerability in Opera web browser
- Critical vulnerability in Opera web browser
- XSS Rays - Google Chrome Browser Extensions
- XSS Rays - Google Chrome Browser Extensions
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- BeEF v0.4.2.1 released
- BeEF v0.4.2.1 released
- Websecurify 0.8Beta1 released
- Websecurify 0.8Beta1 released
- WEB BROWSER SECURITY SOCIALLY-ENGINEERED MALWARE PROTECTION
- WEB BROWSER SECURITY SOCIALLY-ENGINEERED MALWARE PROTECTION
- SDRF Vulnerability in Web-Applications and Browsers
- SDRF Vulnerability in Web-Applications and Browsers
Papers
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- 2011 Data Breach Investigations Report
- 2011 Data Breach Investigations Report
- Mozilla Firefox Internals & Attack Strategies
- Mozilla Firefox Internals & Attack Strategies
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- Credit Card skimming and PIN harvesting in an EMV world
- Credit Card skimming and PIN harvesting in an EMV world
- Exposing the Lack of Privacy in File Hosting Services
- Exposing the Lack of Privacy in File Hosting Services
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Leaking browsing history via user interaction and side channel attacks
- Leaking browsing history via user interaction and side channel attacks
- HTTP Geolocation
- HTTP Geolocation
- HITB Magazine Issue 005 released
- HITB Magazine Issue 005 released
- Symantec Report on Attack Kits and Malicious Websites
- Symantec Report on Attack Kits and Malicious Websites
- Trustwave's Global Security Report 2011: Web Application Risks
No response to “Cross Site URL Hijacking by using Error Object in Mozilla Firefox.”
Leave a reply