Address Bar Spoofing
Summary
A critical Address Bar Spoofing vulnerability was identified in the Aloha Browser. An attacker can craft a specific URL that, when loaded, displays a trusted domain (e.g., google.com) in the browser's address bar while actually rendering content from a malicious third-party origin. This is a high-impact flaw typically used in advanced phishing attacks.
Environment
• Application: Aloha Browser
• Platform: iOS
• Date of Discovery: March 4, 2026
Steps to Reproduce
1. Open the Aloha Browser.
2. Input a manipulated URL into the address bar.
• Example 1: https://0x403for.github.io/spoofing.html
• Example 2: https://google.com:81/... (using port manipulation)
3. Execute the navigation (press "Go" or the arrow key).
4. Observe the address bar at the bottom of the screen once the page loads.
Expected Result
The browser's address bar should consistently and accurately display the actual origin (scheme + host) of the loaded content (e.g., 0x403for.github.io) to ensure user security.
Actual Result
The address bar incorrectly displays google.com along with the SSL padlock icon, despite the page content being served from a different domain (github.io). This misleads the user into believing they are on a legitimate site.
Impact
This vulnerability allows for highly convincing phishing attacks. Users may be tricked into providing sensitive information, such as login credentials or financial data, because the UI provides a false sense of security by showing a trusted URL and a valid SSL indicator.
Remediation Suggestions
• Origin Validation: Implement stricter URL parsing to ensure the UI component for the address bar always reflects the true origin after all redirects and port handling.
• UI Truncation Fix: Ensure that long URLs or specific port numbers do not cause the real domain to be pushed out of view or hidden by the UI.
Thanks for reporting!
We are looking into it and add fixes asap 🛠️
Best,
Aloha Team
Thanks for reporting!
We are looking into it and add fixes asap 🛠️
Best,
Aloha Team
Hi Aloha Team, thank you for the quick response and for fixing the issue. Since this vulnerability was identified as a critical security flaw (Address Bar Spoofing), I was wondering if this report is eligible for a bug bounty or any form of recognition under your security program? Looking forward to hearing from you. Best regards, Sarwo Edi Wibowo
Hi Aloha Team, thank you for the quick response and for fixing the issue. Since this vulnerability was identified as a critical security flaw (Address Bar Spoofing), I was wondering if this report is eligible for a bug bounty or any form of recognition under your security program? Looking forward to hearing from you. Best regards, Sarwo Edi Wibowo
Thank you for the reward! I am happy to help improve Aloha Browser's security.
My email address linked to my Aloha Profile is: bowoe5086@gmail.com
Please let me know once the Premium plan has been activated. Thank you!
Thank you for the reward! I am happy to help improve Aloha Browser's security.
My email address linked to my Aloha Profile is: bowoe5086@gmail.com
Please let me know once the Premium plan has been activated. Thank you!
Replies have been locked on this page!