Javascript design flaws...

Hi malware fighters,

Many have heard about JS exploits like clickjacking, but there are other JavaScript design flaws, as the following example shows… First of all the user clicks on a button/link. Then a new tab/window opens which loads the content of hxxp://www.google.com. Five seconds later, the newly created tab is preloaded with the content of hxxp://www.gnucitizen.org. Disturbing here is the break in trust relationship between the user and google.com… and there are various other ways to play out this simple magic… as gnucitizen found.

<html>
  <body>
    <script>
      function clickme() {
        var w = window.open('hxxp://www.google.com');
        setTimeout(function () {
          w.location = 'hxxp://www.gnucitizen.org';
        }, 5000);
      }
    </script>
    <input type="button" value="click me" onclick="clickme(this)"/>
  </body>
</html>

Just another reason to have NoScript and RequestPolicy inside the Fx browser,

polonus