search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Multiple web browsers do not properly interpret TABLE elements when displaying URLs in the status bar

Vulnerability Note VU#925430

Original Release Date: 2004-11-04 | Last Revised: 2004-11-05

Overview

Multiple web browsers do not properly display the location of HTML documents in the status bar. An attacker could exploit this behavior to mislead users into revealing sensitive information.

Description

Web browsers frequently display the Uniform Resource Locator (URL) in the status bar when a user moves the cursor over links contained within the page. A vulnerability exists in the way multiple web browsers interpret HTML to determine the correct URL to display in the browser's status bar.

The Hypertext Markup Language (HTML) supports the use of the TABLE element. The TABLE element is used to organize content into a series of rows and columns of cells within the document. When certain web browsers encounter a specific series of ANCHOR (e.g., <a href="..."></a>) and TABLE elements, they will display a URL in the status bar that is different than the URL that is accessed when the user clicks on the link.

To illustrate this scenario, please see below:

[begin anchor1]
     [begin table]
          [begin anchor2]
          [end anchor2]
     [end table]
[end anchor1]

In the scenario depicted above, anchor1 will be displayed in the browser's status bar and anchor2 will be accessed when the user clicks on the link.

Note: In the case of Internet Explorer, exploitation of this vulnerability does not require Active scripting to be enabled.

Impact

An attacker could mislead a user to into believing that the URL specified in the status bar is the site that will be accessed when the user clicks on the link. However, when the user clicks on the link they will visit a site different than the URL specified in the status bar and potentially controlled by the attacker. The attacker could use additional social engineering techniques to trick the victim into disclosing sensitive information such as credit card numbers, account numbers, and passwords.

Solution

We are currently unaware of a practical solution to this problem.

Install Windows XP Service Pack 2 (SP2)

Microsoft Windows XP SP2 does not appear to be affected by this vulnerability.

Read and send email in plain text format

Outlook 2003, Outlook 2002 SP1, and Outlook 6 SP1 can be configured to view email messages in text format. Consider the security of fellow Internet users and send email in plain text format when possible. Note that reading and sending email in plain text will not necessarily prevent exploitation of this vulnerability.

Vendor Information

925430
 

Apple Computer Inc. Affected

Updated:  November 04, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

We have verified that this vulnerability does affect Safari 1.2.3 (v125.9).

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Microsoft Corporation Affected

Updated:  November 04, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

We have verified that this vulnerability affects Internet Explorer 6.0.2800.1106.xpsp1.020828-1920

If you have feedback, comments, or additional information about this vulnerability, please send us email.

KDE Desktop Environment Project Unknown

Updated:  November 04, 2004

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

We have verified that this vulnerability does not affect Konqueror version 3.3.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Mozilla Unknown

Updated:  November 04, 2004

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

We have verified that this vulnerability does not affect Mozilla version 1.7.3.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Opera Software Unknown

Updated:  November 04, 2004

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

We have verified that this vulnerability does not affect Opera version 7.54.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Benjamin Tobias Franz.

This document was written by Will Dormann and Damon Morda.

Other Information

CVE IDs: None
Severity Metric: 0.33
Date Public: 2004-10-28
Date First Published: 2004-11-04
Date Last Updated: 2004-11-05 18:54 UTC
Document Revision: 16

Sponsored by CISA.