Not true.. tested it on: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5) Gecko/20031110 Firebird/0.7 Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5) Gecko/20031007 Firebird/0.7 Em Ter, 2003-12-09 às 22:13, Pedro Castro escreveu: > It does also apply to Mozilla Firebird 0.7. > > > > John W. Noerenberg II wrote: > > > This exploit also applies to the Macintosh version of Explorer > > v5.2.3(5815.1) > > > >> From: <bugtraq@zapthedingbat.com> > >> To: bugtraq@securityfocus.com > >> Subject: Internet Explorer URL parsing vulnerability > >> > >> > >> > >> Internet Explorer URL parsing vulnerability > >> Vendor Notified 09 December, 2003 > >> > >> # Vulnerability ########## > >> There is a flaw in the way that Internet Explorer displays URLs in > >> the address bar. > >> > >> By opening a specially crafted URL an attacker can open a page that > >> appears to be from a different domain from the current location. > >> > >> # Exploit ########## > >> By opening a window using the http://user@domain nomenclature an > >> attacker can hide the real location of the page by including a 0x01 > >> character after the "@" character. > >> Internet Explorer doesn't display the rest of the URL making the page > >> appear to be at a different domain. > >> > >> # POC ########## > >> http://www.zapthedingbat.com/security/ex01/vun1.htm > >> > >> # Tested ########## > >> Internet Explorer > >> Version 6.0.2800.1106C0 > >> Updates: SP1, Q810847, Q810351, Q822925, Q330994, Q828750, Q824145 > >> > >> # Credit ########## > >> Zap The Dingbat > >> http://www.zapthedingbat.com/ > > > > -- Tiago Pierezan Camargo Software Engineer Telenova Research and Development Centre +55 51 33280636 ext. 222 www.telenova.net