Internet Explorer 8 Beta Inline URL Spoofing Vulnerability
(C) SecNiche Security
Aditya K Sood
It is possible for an attacker to launch a spoofing attack,a situation in which one person or program
successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
Different variants of spoofing can be:
1 Man-in-the-middle attack and internet protocol spoofing
2 URL spoofing and phishing
3 Referer spoofing
4 Poisoning of file-sharing networks
5 Caller ID spoofing
6 E-mail address spoofing
It has been tested on Google Chrome and Mozilla Firefox which interpreted the links effectively. The window status bar fetch the
desired URL as per security concern.