{"vuid":"VU#347188","idnumber":"347188","name":"Microsoft Internet Explorer 7 may allow address bar spoofing","keywords":["Microsoft","Internet Explorer","IE7","IE","spoofing","phishing","popup","address bar","special characters"],"overview":"Internet Explorer 7 may allow address bar spoofing in pop-up windows. This could let an attacker spoof the address of a web site.","clean_desc":"Internet Explorer 7 includes a new feature called \"Address bar protection.\"  This makes sure that every window, including pop-ups, will present an address bar to the user. By using a specially crafted URI, an attacker can spoof this address bar in a pop-up window.","impact":"This vulnerability could be used to convince a user that the intruder's web site was actually a web site that the user trusts and might provide sensitive information to.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"Disable Active scripting Disabling Active scripting in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. Instructions for disabling Active scripting in the Internet Zone can be found in the \"Securing Your Web Browser\" document. Verify web site certificates Before providing sensitive information to a web site, verify the site's certificate as specified in US-CERT Cyber Security Tip ST05-010.","sysaffected":"","thanks":"This vulnerability was publicly disclosed by Secunia.","author":"This document was written by Will Dormann.","public":["http://secunia.com/advisories/22542/","http://isc.sans.org/diary.php?storyid=1804","http://secunia.com/internet_explorer_7_popup_address_bar_spoofing_test/","http://www.microsoft.com/windows/ie/ie7/about/features/default.mspx","http://blogs.msdn.com/ie/archive/2005/11/21/495507.aspx"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-10-25T15:36:13Z","publicdate":"2006-10-25T00:00:00Z","datefirstpublished":"2006-10-26T17:54:59Z","dateupdated":"2006-10-26T17:55:16Z","revision":7,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"15","cam_impact":"1","cam_easeofexploitation":"20","cam_attackeraccessrequired":"18","cam_scorecurrent":"2.835","cam_scorecurrentwidelyknown":"2.835","cam_scorecurrentwidelyknownexploited":"4.86","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.835,"vulnote":null}