If you are using Microsoft’s Internet Explorer currently, all what you type in the browser’s address bar may be leaked to sites.

The issue was disclosed by security researcher Manuel Caballero on Tuesday on the Broken Browser website.

When a script is executed inside an object-html tag, the location object will get confused and return the main location instead of its own. To be precise, it will return the text written in the address bar so whatever the user types there will be accessible by the attacker.

Basically, what it means is that sites may run a simple script to find out what users type in the Internet Explorer address bar while the user is on the site.

You can check out this proof of concept page to find out if your version of Internet Explorer, or in fact any other browser, is affected by the issue.

Simply type anything that comes to your mind in Internet Explorer’s address bar while you are on the page, and hit the Enter-key afterwards. The web page will intercept the load process, e.g. the loading of Bing search if you did not type an address, and display the query to you on the page that it loads.

This confirms that anything you type may be leaked to the site if it implements such a script. Details on how the researcher stumbled upon the bug are posted on the disclosure post.

Internet Explorer’s handling of location objects when injected “onbeforeunload” is flawed, as it returns the location the browser is going to or what is currently written into the address bar.

In other words, if we retrieve the location.href of the object while the user is leaving the main page, we will be able to know what was typed into the address-bar, or, if the user clicked on a link we will know the address of the link that the browser is going to.

That’s it! Now we will retrieve the object location when the user is leaving and know exactly what she typed into the address bar. It does not have to be a full URL, for example, if the user types words into the address bar, it will automatically be converted to a search query URL (Bing by default on IE) which can of course be completely read!

Here is a demo video that showcases the vulnerability in Internet Explorer:

This  Windows 10 Build 15002 ships with many new features

I tested this in the most recent version of Internet Explorer on Windows 10, and it is affected by the issue.

There is no workaround right now to protect what you type from being leaked in Internet Explorer. The two options that you have are to either be very careful when it comes to entering anything in the browser’s address bar, or to use a different browser until Microsoft fixes the issue.

Ghacks needs you. You can find out how to support us here or support the site directly by becoming a Patreon. Thank you for being a Ghacks reader.

The post Internet Explorer bug leaks what you type to sites appeared first on gHacks Technology News.

Source link