TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Safari omnibar spoofing vulnerability?

1 点作者 Johngibb将近 13 年前
I've noticed that a recent update (Mountain Lion?) has brought the omnibar to Safari. And I've also noticed another nice touch - if you search for something using the omnibar, rather than the url changing to something like google.com/search?q=search term, the search term itself stays in the address bar.<p>However - this means that if you search for an _actual_ url, it _also_ gets displayed in the url bar.<p>If you have Google as your default search engine, and you click this url: http://www.google.com/search?q=www.apple.com you will see www.apple.com in your address bar.<p>Isn't this a vector for a spoofing attack? Couldn't someone craft a "search engine" that makes it look like you're on a facebook.com login page, and use it to steal passwords?

2 条评论

Johngibb将近 13 年前
Click this using Mountain Lion Safari and look in your address bar to see what I mean: <a href="http://www.google.com/search?q=www.apple.com" rel="nofollow">http://www.google.com/search?q=www.apple.com</a>
brunolazzaro将近 13 年前
It kind of does. But to exploit the vulnerabilty, one must change the search engine first to a "spoofing" one. I don't know if this can be done via extensions as is done in chrome.