Arthur T Knackerbracket has found the following story:
Chrome, Firefox and other web browsers are plagued by vulnerabilities that can be exploited to spoof their address bar. Some of the affected vendors are still working on addressing the issues.
Pakistan-based researcher Rafay Baloch discovered that the address bar in Google Chrome, also known as the omnibox, can be tricked into flipping URLs.
The problem, which affects Chrome for Android, is related to how Arabic and Hebrew text is written from right to left (RTL). If an attacker's URL starts with an IP address and it contains an Arabic character, the URL's host and path are reversed.
For example, the URL 127.0.0.1/ا/http://example.com becomes http://example.com/ا/127.0.0.1 as it contains the "ا" character, the Arabic letter alef, which causes the URL to be rendered RTL. The method works with other Arabic characters as well, as long as they are the rightmost "strong" character – the numbers and the dots in the IP address are considered "weak" characters.
"The IP address part can be easily hided specially on mobile browsers by selecting a long URL (google.com/fakepath/fakepath/fakepath/... /127.0.0.1) in order to make the attack look more realistic," Baloch explained in a blog post. "In order to make the attack more realistic unicode version of padlock can be used in order to demonstrate the presence of SSL."
(Score: 1, Informative) by Anonymous Coward on Friday August 19 2016, @08:15PM
The example URI [rafayhackingarticles.net] for vulnerable browsers didn't work on Pale Moon 26.3.0 (x86), either.
Still, seems like as good a time as any to update...