├── screenshot.png ├── content.html ├── index.html └── README.md /screenshot.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/musalbas/address-spoofing-poc/HEAD/screenshot.png -------------------------------------------------------------------------------- /content.html: -------------------------------------------------------------------------------- 1 | 2 |
3 | This is not facebook.com! This is EVIL! 4 | 7 | 8 | 9 | -------------------------------------------------------------------------------- /index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 17 | 18 | 19 | 20 | Login with Facebook 21 | 22 | 23 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | This is a modification of a proof-of-concept of a chrome address spoofing flaw published by David Leo (david.leo () deusen co uk) on the [Full Disclosure mailing list](http://seclists.org/fulldisclosure/2015/Jun/108). 2 | 3 | (According to the [original publication](http://seclists.org/fulldisclosure/2015/Jun/108), this was reported to Google but it was regarded as a non-vulnerability.) 4 | 5 | This version spoofs the HTTPS version of facebook.com. Surprisingly, it even shows the certificate in green: 6 | 7 |  8 | 9 | You can try a [live demo](http://musalbas.github.io/address-spoofing-poc/) but note that you may have to try it a few times for it to work. There's a connection timing condition involved. However if you clone the repo locally, it should work 100% of the time. 10 | 11 | Note that you can't interact with the spoofed web page, making the severity of this vulnerability limited as it can't be used to do direct phishing. 12 | --------------------------------------------------------------------------------