Microsoft to Change IE Behavior to Block Spoofing Attacks
http://username:password@server/file.html syntax to be disallowed by an upcoming software update. Problematic feature was recently made more dangerous by the unveiling of a display bug in browser.Microsoft Corp. has announced in a support document that it will be releasing a software update to Internet Explorer and Windows Explorer to disable the use of certain syntax in HTTP URLs. The syntax, designed to allow a username and password to be passed to a password-protected page, has a history of abuse. The company did not give a timeline for the release of the patch. The syntax takes the form http[s]://username:password@server/file.html, such as http://joe:firstname.lastname@example.org/, where "joe" is the username and "blow" is the password. But a site that does not look for the username and password will ignore the values passed, and only the string after the "@" symbol is used for the domain name. Other browsers support this syntax to varying degrees. Because the values before "@" are ignored, attackers have often attempted to use them to confuse users into believing that they are going to a different site than they are actually visiting. For example, the URL http://www.microsoft.com%2F@10.11.12.13/ might appear to be going to www.microsoft.com, but it is actually going to the IP address 10.11.12.13.
The problem was compounded by the recent discovery of a display bug in Internet Explorer that stops the browser from displaying parts of the URL. This allows an attacker utilizing both techniques to display only the legitimate looking portion of the URL to the user.