SHARE
Facebook X Pinterest WhatsApp

New IE Flaw Spoofs URLs

A series of HTML-based exploits allow a malicious HTML programmer to direct a user to a different Web site than the one indicated in the user’s browser status line. Two separate but similar issues affect Internet Explorer. The first, reported by Benjamin Franz of Germany on the Bugtraq mailing list, involves an improper mixture of […]

Written By: Larry Seltzer
Oct 31, 2004
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A series of HTML-based exploits allow a malicious HTML programmer to direct a user to a different Web site than the one indicated in the user’s browser status line.

Two separate but similar issues affect Internet Explorer. The first, reported by Benjamin Franz of Germany on the Bugtraq mailing list, involves an improper mixture of anchor and table tags, with links to two different sites.

On fully-patched Windows systems prior to Windows XP SP2, users hovering over the link will see one URL in the status bar, but when they click on the link, they will be taken to a different address. On Windows XP SP2, clicking on the link brings the user to the same address indicated in the status line. Users hovering just below the link will see the second address, but clicking in this area does not change the browser location.

The second report, also reported on Bugtraq, is by the well-known malware researcher http-equiv. The effect is similar to the first, but the bug works on fully-patched Windows XP SP2 systems. The technique involves the mixture of an empty anchor tag and a form tag with both an action statement indicating one address and an input tag with the type of submit and a value of the other address, all in the presence of a base href tag indicating the second address.

Click here to read about another bug that allows programs to be planted and executed on fully-patched SP2 systems.

The significance of either bug is questionable, as the same effect has long been possible using JavaScript and other techniques.

Mozilla is not generally subject to these attacks, but others have observed that in some of these attacks, if the user Ctrl-clicks to load the link in a separate tab, that tab will load the second address not indicated by the status line.

Check out eWEEK.com’s for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s Weblog.


Be sure to add our eWEEK.com security news feed to your RSS newsreader or My Yahoo page

Recommended for you...

Databricks Raises at $100B+ Valuation on AI Momentum
Allison Francis
Aug 20, 2025
Keepit Achieves SOC 2 Type 1 & Canadian Ingram Micro Deal
Jordan Smith
Aug 20, 2025
AI Customer Service Fails to Satisfy Consumer Needs: Verizon
Franklin Okeke
Aug 19, 2025
GoTo Pulse Survey Shows AI Promise, Highlights Gaps to Fill
Victoria Durgin
Aug 19, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.