BugTraq
Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability May 27 2004 09:53AM
sandrijeski yahoo com (3 replies)
Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability May 28 2004 05:57AM
Peter Pentchev (roam ringlet net)
Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability May 27 2004 08:01PM
Robert J Taylor (robert rjamestaylor com)
sandrijeski (at) yahoo (dot) com [email concealed] wrote:

>In-Reply-To: <40A90108.9000301 (at) kurczaba (dot) com [email concealed]>
>
>I can't see this as vulnerability because its legal code I do something similar without using image map for my site to hide the affiliate tracking code.
>This is the code:
><a onmouseover="window.status='http://www.the-url-you-see.com;return true"
>title="The Link"
>onmouseout="window.status='Whatever-you-like-here';return true"
>href='http://www.some-other-url.com'>The link</a>
>
>
>
Being able to do something intentionally doesn't make it safe or
ethical. You are hiding tracking information from the person using your
site; in effect and in fact you are lying to your visitor. As a visitor
to your site I would not appreciate my browser hiding the real contents
of information used to track me and or hide the real purpose of a
benign-looking link. I would want my browser to be my agent, not yours.

Your anecdote rather establishes the vulnerability and points to its
current use "in the wild."

Regards,

Robert J Taylor
robert-bugtraq (at) rjamestaylor (dot) com [email concealed]

[ reply ]
Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability May 27 2004 07:47PM
Valdis Kletnieks vt edu


 

Privacy Statement
Copyright 2010, SecurityFocus