Yes, I see where you are going, but to be precise, and I think we
should so that people do not start saying 'Django is susceptible to
XSS!'  it is the other site that would most likely be vulnerable to
XSS.  You would have to go to that site and click a link imbedded
somewhere, and then for no apparent reason, have your own django admin
login presented to you, log in and then it would send something,
presumably your django session id, somewhere else.  This is pretty
much just an overly complext XSS attack on the first site, to gain
django credentials, but does not constitute a Django XSS attack.
Perhaps we could say that Django is  susceptible to a new class of
attack, but it is not XSS, nor XSRF. I vote we call it either 'ICXSRA'
(for Inconveniently Complex Cross Site Reception Attack), or 'joe'.
You pick.
-richard


On 5/7/08, James Bennett <[EMAIL PROTECTED]> wrote:
>
> On Wed, May 7, 2008 at 3:18 PM, Richard Dahl <[EMAIL PROTECTED]> wrote:
> >  If I said that this condition is indicative of an XSS attack vector I
> >  may as well say that Apache is vulnerable to a Denial of Service
> >  attack because 'after I ran apachectl stop, I could no longer get to
> >  my website'
>
> No, because someone else could put a link on their site to my admin
> with this sort of thing embedded. Yeah, it's a big reach in terms of
> the user needing to be completely braindead to fall for it, but it's
> possible and so we need to take it seriously.
>
>
> --
> "Bureaucrat Conrad, you are technically correct -- the best kind of correct."
>
> >
>

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/django-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to