[WEB SECURITY] URL Spoofing vulnerability in bots of search engines #2
mustlive at websecurity.com.ua
Thu Apr 30 14:02:27 EDT 2009
Hello participants of Mailing List.
I already wrote you
about URL Spoofing vulnerability in GoogleBot, Yahoo! Slurp, Mozilla and
Internet Explorer (http://websecurity.com.ua/3079/), which also can exists
in bots of other search engines. Let's continue this talk.
As I mentioned, with this vulnerability it's possible to spoof URL and
conduct fishing attacks, and use it for spreading of malware. Besides, this
method can be used for SEO, to add new keywords into URL, at the same time
to not overload real address of web site.
In previous advisory I wrote about using of space for URL Spoofing attack,
which I also called domain gluing. As I checked, besides space (%20) for
this attack other chars also can be used.
Mozilla supports: %00..%ff.
IE6 and IE7 supports: %20..%2d and %30..%ff.
At that IE during request to the site immediately changes url-encoded chars
to their common equivalents, or remove them at all (if these chars are not
Note, that if space chars (%20) in addresses of the sites for conducting of
this attack I found in search engines (Google and Yahoo), then I didn't meet
the using of other chars, so it's not known if search engines support the
indexing of such chars in name of domains. But potentially bots of search
engines can support them (GoogleBot, Yahoo! Slurp and others).
Also I found, that possibility of this attack also depends on settings of
web server, which must support any domains. So this attack can be conducted
not at any web site, but only at appropriately configured ones.
Particularly besides www.tab.net.ua, this attack is also possible at
www.engadget.com and www.poweroptimizer.com.
Indexed by Google:
Indexed by Yahoo:
Vulnerable is GoogleBot.
Vulnerable is Yahoo! Slurp.
Vulnerable are Mozilla 1.7.x and previous versions.
Vulnerable versions are Internet Explorer 6 (6.0.2900.2180), Internet
Explorer 7 (7.0.6001.18000) and previous versions. And potentially IE8.
I mentioned about this vulnerability at my site:
Best wishes & regards,
Administrator of Websecurity web site
Join us on IRC: irc.freenode.net #webappsec
Have a question? Search The Web Security Mailing List Archives:
Subscribe via RSS:
http://www.webappsec.org/rss/websecurity.rss [RSS Feed]
Join WASC on LinkedIn
More information about the websecurity