Upvote 1

Address Bar Spoofing

Solved Sarwo Edi Wibowo 21 days ago

Summary

A critical Address Bar Spoofing vulnerability was identified in the Aloha Browser. An attacker can craft a specific URL that, when loaded, displays a trusted domain (e.g., google.com) in the browser's address bar while actually rendering content from a malicious third-party origin. This is a high-impact flaw typically used in advanced phishing attacks.


Environment

• Application: Aloha Browser

• Platform: iOS

• Date of Discovery: March 4, 2026


Steps to Reproduce

1. Open the Aloha Browser.

2. Input a manipulated URL into the address bar.

• Example 1: https://0x403for.github.io/spoofing.html

• Example 2: https://google.com:81/... (using port manipulation)

3. Execute the navigation (press "Go" or the arrow key).

4. Observe the address bar at the bottom of the screen once the page loads.


Expected Result

The browser's address bar should consistently and accurately display the actual origin (scheme + host) of the loaded content (e.g., 0x403for.github.io) to ensure user security.


Actual Result

The address bar incorrectly displays google.com along with the SSL padlock icon, despite the page content being served from a different domain (github.io). This misleads the user into believing they are on a legitimate site.


Impact

This vulnerability allows for highly convincing phishing attacks. Users may be tricked into providing sensitive information, such as login credentials or financial data, because the UI provides a false sense of security by showing a trusted URL and a valid SSL indicator.


Remediation Suggestions

• Origin Validation: Implement stricter URL parsing to ensure the UI component for the address bar always reflects the true origin after all redirects and port handling.

• UI Truncation Fix: Ensure that long URLs or specific port numbers do not cause the real domain to be pushed out of view or hidden by the UI.

Replies (3)

photo
1

Thanks for reporting!

We are looking into it and add fixes asap 🛠️

Best,

Aloha Team

photo
1

Hi Aloha Team, thank you for the quick response and for fixing the issue. Since this vulnerability was identified as a critical security flaw (Address Bar Spoofing), I was wondering if this report is eligible for a bug bounty or any form of recognition under your security program? Looking forward to hearing from you. Best regards, Sarwo Edi Wibowo

photo
1

Hi, yes we do reward users for reporting issues with Premium plan, we will be happy to add it to your Aloha Profile account, only we need your email address linked to it.

photo
photo
1

Thank you for the reward! I am happy to help improve Aloha Browser's security.

My email address linked to my Aloha Profile is: bowoe5086@gmail.com

Please let me know once the Premium plan has been activated. Thank you!

photo
1

Its active, enjoy 3 months of Premium plan ✨

photo
Leave a Comment
 
Attach a file
You can't vote. Please authorize!