http://img441.imageshack.us/img441/3937/dsfsdfsdf.png
I took the picture with no-script and anti-css leak script running at the same time.Quote:
It uses the fact that properties within display: when combined with a:visited creates conditional logic. That condition will not fire certain things within the block. In this case I am including a nonexitant background image background: url(...); set in the CSS itself that is seemless to the user. The image actually points to a CGI script with the information about the URL that has been visited and is then logged along with the IP address of the user for later retrieval.
Pretty scary that this can make it past all this extra security.
Mozilla definitely needs to address this soon, as it is starting to get out of hand if you ask me....
*I can confirm however that private browsing does negate this new attack... But it's still sort of a pain to browse like that.