Multiple Browsers Window Injection Vulnerability

Secunia Research has reported a vulnerability, which affects most browsers. The vulnerability can be exploited by a malicious web site to "hi-jack" a named browser window, regardless of which web site is the true "owner" of the window.

You can find a test on their website: http://secunia.com/multiple_browsers_window_injection_vulnerability_test/

My question is now: How can we protect our websites for this vulnerability? Ok, we can wait until a bugfix will be available for all browsers. Should we test every second if the opened window is from the same location as we started?

 

4 Comments

  • Aviv Raff said

    You can just check that the location is in the same domain, by trying to access the document in the frame. If it fails for permissions, it means that the frame location is on other domain and was probably hijacked.

  • Michael said

    Yes, but do you want to check for this every second, or only one time? And, what is if you have found that the window has been hijacked, you cannot modify the content... and the user will enter his credentials what ever.

    Any good idea?

  • Aviv Raff said

    I think it should be checked within a reasonable interval.
    If it was hijacked, you should alert the user, and close the popup window (after all, you do have a pointer to the window, right?).

Comments have been disabled for this content.