描述
The Custom Button Installer dialog in Google Toolbar 4 and 5 beta presents certain domain names in the (1) "Downloaded from" and (2) "Privacy considerations" sections without verifying domain names, which makes it easier for remote attackers to spoof domain names and trick users into installing malicious button XML files, as demonstrated by presenting www.google.com when the button was downloaded from an arbitrary site through an open redirector on www.google.com.
AI分析AI驱动
受影响产品
googletoolbar
4
googletoolbar
5
参考资料
- http://aviv.raffon.net/2007/12/18/GoogleToolbarDialogSpoofingVulnerability.aspxExploit
- http://secunia.com/advisories/28166Vendor Advisory
- http://securityreason.com/securityalert/3491
- http://www.osvdb.org/39499
- http://www.securityfocus.com/archive/1/485288/100/0/threaded
- http://www.securityfocus.com/bid/26923
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39164
- http://aviv.raffon.net/2007/12/18/GoogleToolbarDialogSpoofingVulnerability.aspxExploit
- http://secunia.com/advisories/28166Vendor Advisory
- http://securityreason.com/securityalert/3491
- http://www.osvdb.org/39499
- http://www.securityfocus.com/archive/1/485288/100/0/threaded
- http://www.securityfocus.com/bid/26923
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39164