Yes, sorry, that's what I was refering too about the "old problem".
Should have been a bit clearer.

It only works on "shared" sites.

Karl Rudd

On 4/3/07, Ⓙⓐⓚⓔ <[EMAIL PROTECTED]> wrote:
Or is it the old problem with domain wide cookies? I give a cookie for
x.com on jake.x.com and you read my cookie on karl.x.com? You still
can't ajax to jake.x.com.

It sounds like disinformation to me!

On 4/2/07, Karl Rudd <[EMAIL PROTECTED]> wrote:
>
> Bah, it's not a new vulnerability, it's always been there and always
> been known about.
>
> I call FUD on this.
>
> The following is an excerpt that is the keystone of the whole thing:
>
> "In an example attack, a victim who has already authenticated
> themselves to an Ajax application, and has the login cookie in their
> browser, is persuaded to visit the attacker's web site. This web site
> contains JavaScript code that makes calls to the Ajax app. Data
> received from the app is sent to the attacker."
>
> Firstly _don't visit suspect sites_.
>
> Secondly their "example attack" is flawed. As far as I'm aware
> JavaScript code on one page does not have access to the cookies of
> other webpages. If it does it's a security flaw in the browser,
> nothing a JavaScript library can do about it.
>
> Karl Rudd
>
> On 4/3/07, Kush Murod <[EMAIL PROTECTED]> wrote:
> >
> > Hi guys,
> >
> > Article below says all big JS Libraries are vulnerable including JQuery
> > I didn't quite understand the article, but was hoping for some feedback
> > on it
> >
> > 
http://www.cbronline.com/article_news.asp?guid=484BC88B-630F-4E74-94E9-8D89DD0E6606
> >
> >
> > Cheers,
> >
> > --
> > Kush Murod, Web applications developer
> > Sensory Networks
> > [E] [EMAIL PROTECTED]
> > [W] www.sensorynetworks.com
> > [T] +61 2 8302 2745
> > [F] +61 2 9475 0316
> > [A] Level 6, 140 William Street East Sydney 2011
> >
> >
>


--
Ⓙⓐⓚⓔ - יעקב   ʝǡǩȩ   ᎫᎪᏦᎬ

Reply via email to