Shovel
Can't get enough of FH
- Joined
- Dec 22, 2003
- Messages
- 1,350
I just stumbled across this:
http://support.microsoft.com/?kbid=834489
It appears that MS are going to remove a large chunk of Internet Explorers userass@ behavior in an effort to combat spoof sites and the malicious code risks they pose.
At the base of the page it does state that a registry switch will allow you to control the new behavior if you want to change it back.
http://support.microsoft.com/?kbid=834489
It appears that MS are going to remove a large chunk of Internet Explorers userass@ behavior in an effort to combat spoof sites and the malicious code risks they pose.
SUMMARY
Microsoft plans to release a software update that removes support for handling user names and passwords in HTTP and HTTP with Secure Sockets Layer (SSL) or HTTPS URLs in Microsoft Internet Explorer. The following URL syntax is no longer supported in Internet Explorer or Windows Explorer after you install this software update:
http(s)://usernameassword@server/resource.ext
This article is intended to give you advance notice of this change in Internet Explorer's default behavior. If you include user information in HTTP or HTTPS URLs, Microsoft recommends that you explore the workarounds that are described in this article before you install this software update. Microsoft will post more information in this article when the software update becomes available.
MORE INFORMATION
Background information
Internet Explorer versions 3.0 and later support the following syntax for HTTP or HTTPS URLs:
http(s)://usernameassword@server/resource.ext
You can use this URL syntax to automatically send user information to a Web site that supports the basic authentication method.
For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
200351 INFO: URL syntax for authentication without dialog prompt
A malicious user could also use this URL syntax to create a hyperlink that appears to open a legitimate Web site but actually opens a deceptive (spoofed) Web site. For example, the following URL appears to open http://www.wingtiptoys.com but actually opens http://example.com:
http://www.wingtiptoys.com@example.com
At the base of the page it does state that a registry switch will allow you to control the new behavior if you want to change it back.