A web browser’s URL can encode a username and a password, using a URL that looks like this:
http(s)://username:password@server/resource.ext
Unfortunately, it turns out that numerous hackers have discovered that you can create a URL that looks like this:
https://www.paypal.com.................
...........................
..........................
..............................
........:....... @badserver.com/
and most people won’t see the periods and will, instead, think that they are logging into the Paypal server.
This Microsoft Knowledgebase article gives warning that “Microsoft plans to release a software update that modifies the default behavior of Internet Explorer for handling user information in HTTP and HTTPS URLs.”
The software will be released through Windows Update, which means that it will be picked up very fast. Of course, this patch also means that Microsoft will be breaking some customer URLs.
Important points here:
1. The user:password@host syntax never really caught on. Instead, cookie-based authentication did, as did browsers caching usernames and passwords, so most people won’t be adversely affected.
2. It’s interesting that Microsoft is increasing breaking features to improve security.
3. You should be paying attention to the fact that Microsoft now has this interesting ability to change software out in the field. So far they’ve only used this power for security updates. This is one of the first times that they’ve used it to remove a working feature.
Don’t settle for half the story.
Get paywall-free access to technology news for the here and now.