Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Address spoofing vulnerability in Safari Web Browser - SANS Internet Storm Center SANS ISC InfoSec Forums


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Address spoofing vulnerability in Safari Web Browser

A new vulnerability arised in Safari Web Browser that can lead to an address spoofing allowing attackers to show any URL address while loading a different web page. While this proof of concept is not perfect, it could definitely be fixed to be used by phishing attacks very easily.

There is a proof of concept http://www.deusen.co.uk/items/iwhere.9500182225526788/. From an iPad Air 2 Safari Web Browser:

From same iPad using Google Chrome:

The code is very simple: webpage reloads every 10 milliseconds using the setInterval() function, just before the browser can get the real page and so the user sees the "real" web address instead of the fake one:

We are interested if you notice any phishing attacks using this vulnerability. If you see one, please let us know using our contact form.

Manuel Humberto Santander Peláez
SANS Internet Storm Center - Handler
Twitter: @manuelsantander
Web:http://manuel.santander.name
e-mail: msantand at isc dot sans dot org

Manuel Humberto Santander Pelaacuteez

185 Posts
ISC Handler
If you just set Safari or for that matter, your browser to "Allow from Current Website Only" when it comes to cookies this does not work.

I think Sans could do better here at proofing this work.
steve

7 Posts
Testing the published proof of concept on my Android 4.4.4 device doesn't seem to work very well except for an immediately noticeable thrashing of the address bar. It doesn't mean it isn't affected, it certainly creates a nice Chrome slowdown. (Replying to earlier comment about possible impact on Chrome on Android).
Jack G.

7 Posts
Quoting steve :If you just set Safari or for that matter, your browser to "Allow from Current Website Only" when it comes to cookies this does not work.

I think Sans could do better here at proofing this work.


Hmm. I think SANS are right. I have cookies set to "Allow from Current Website Only" in Safari - the proof of concept works for me.

However, my MBP goes nuts with the fans ramping up with the increase in CPU load...not surprising I suppose given what the code does. How hot did the iPad get that was used to test?

Played around with some other browsers. Firefox displays the true URL and the CPU goes nuts. Opera became in-Opera-tive (ha ha) and I had to force quit. So potentially you could be lured to a malicious site, be deafened by your Mac's cooling fans and attempt to enter your personal information into what is likely to become an increasingly unresponsive web page as your computing resources are consumed :-)
AnonymousChris

1 Posts

Sign Up for Free or Log In to start participating in the conversation!