[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-04 Thread Nathan Young -X \(natyoung - Artizen at Cisco\)
ROTECTED] > -Original Message- > From: jquery-en@googlegroups.com > [mailto:[EMAIL PROTECTED] On Behalf Of Chris Ovenden > Sent: Wednesday, April 04, 2007 4:02 AM > To: jQuery (English) > Subject: [jQuery] Re: Web 2.0 is vulnerable to attack > > > I just

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-04 Thread Markus Peter
On 04.04.2007, at 13:02, Chris Ovenden wrote: I just read the paper and, correct me if I'm wrong, this vulnerability *only* applies to JSON. XML is safe, because it has to be parsed before the data can be extracted. I avoid JSON because I don't like to have eval() statements in my code. This w

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-04 Thread Chris Ovenden
I just read the paper and, correct me if I'm wrong, this vulnerability *only* applies to JSON. XML is safe, because it has to be parsed before the data can be extracted. I avoid JSON because I don't like to have eval() statements in my code. This would seem a more obvious solution to the problem t

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Benjamin Sterling
Nathan, All good information, much appreciated. -- Benjamin Sterling http://www.KenzoMedia.com http://www.KenzoHosting.com

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Nathan Young -X \(natyoung - Artizen at Cisco\)
oung - Artizen at Cisco) > Sent: Tuesday, April 03, 2007 3:30 PM > To: jquery-en@googlegroups.com > Subject: [jQuery] Re: Web 2.0 is vulnerable to attack > > > Hi. > > I know you asked for code but what you're getting is more > talk. Sorry. > > You can't

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Nathan Young -X \(natyoung - Artizen at Cisco\)
m > [mailto:[EMAIL PROTECTED] On Behalf Of Benjamin Sterling > Sent: Tuesday, April 03, 2007 12:10 PM > To: jquery-en@googlegroups.com > Subject: [jQuery] Re: Web 2.0 is vulnerable to attack > > >>How about posting some example code that shows an example > of how secret

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Brian Miller
Keep in mind that this is more of a server-side thing. The only JS piece involves adding a variable value to your URL when pulling the data through a script tag or an iframe. e.g.: http://mysite/myapplication?uniquevalue=foo Then, your server application should return an error (perhaps 500?) i

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Benjamin Sterling
How about posting some example code that shows an example of how secret one time tokens can be created and used within jQuery. I second that. It would go a long way in educating me on the proper way of doing things. -- Benjamin Sterling http://www.KenzoMedia.com http://www.KenzoHosting.com

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Rey Bango
_.:||:._.:||:._.:||:._.:||:._.:||:._.:||:. Nathan Young Cisco.com->Interface Development A: ncy1717 E: [EMAIL PROTECTED] -Original Message- From: jquery-en@googlegroups.com [mailto:[EMAIL PROTECTED] On Behalf Of Markus Peter Sent: Tuesday, April 03, 2007 3:56 AM To: jquery-en@googlegroups.

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Nathan Young -X \(natyoung - Artizen at Cisco\)
:||:._.:||:._.:||:._.:||:._.:||:._.:||:._.:||:._.:||:. Nathan Young Cisco.com->Interface Development A: ncy1717 E: [EMAIL PROTECTED] > -Original Message- > From: jquery-en@googlegroups.com > [mailto:[EMAIL PROTECTED] On Behalf Of Markus Peter > Sent: Tuesday, April 0

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Karl Rudd
Yes, you're right, I was calling "FUD" on the article. I dashed that email off rather too quickly in retrospect. The paper itself is quite reasonable in it's treatment of things. Karl Rudd On 4/3/07, Markus Peter <[EMAIL PROTECTED]> wrote: On 03.04.2007, at 08:07, Karl Rudd wrote: > > Bah, it

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Markus Peter
On 03.04.2007, at 08:07, Karl Rudd wrote: Bah, it's not a new vulnerability, it's always been there and always been known about. I call FUD on this. The following is an excerpt that is the keystone of the whole thing: "In an example attack, a victim who has already authenticated themselves

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Kenneth
I don't doubt that someone put alot of time into this particular FUD piece, but once again (just like all the other articles on this subject), no proof is given. If it's so easy, have it read an arbitrary email from my GMail and THEN I will take the arguments seriously. In the mean time, I laugh

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-03 Thread Wil Stuckey
On 4/3/07, Pedro Luz <[EMAIL PROTECTED]> wrote: javascript also as the SOP (same origin policy) actually it doesn't, this is how google adsense for example works. w

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-02 Thread Pedro Luz
javascript also as the SOP (same origin policy) On Apr 3, 7:23 am, "Erik Beeson" <[EMAIL PROTECTED]> wrote: > Agreed. This comes up every few months. In this case, it looks like > they're talking about JSON data being readable from any host. I guess > they mean if you're getting data via the remo

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-02 Thread Erik Beeson
Agreed. This comes up every few months. In this case, it looks like they're talking about JSON data being readable from any host. I guess they mean if you're getting data via the remote script tag and callback technique, other sites could do the same thing and access your data? Seems like a prett

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-02 Thread Karl Rudd
Yes, sorry, that's what I was refering too about the "old problem". Should have been a bit clearer. It only works on "shared" sites. Karl Rudd On 4/3/07, Ⓙⓐⓚⓔ <[EMAIL PROTECTED]> wrote: Or is it the old problem with domain wide cookies? I give a cookie for x.com on jake.x.com and you read my c

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-02 Thread Ⓙⓐⓚⓔ
Or is it the old problem with domain wide cookies? I give a cookie for x.com on jake.x.com and you read my cookie on karl.x.com? You still can't ajax to jake.x.com. It sounds like disinformation to me! On 4/2/07, Karl Rudd <[EMAIL PROTECTED]> wrote: Bah, it's not a new vulnerability, it's alwa

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-02 Thread Pedro Luz
Nice article... AJAX, as Kevin Murphy said ... "Since Ajax is in its infancy, this is fair less of a problem than, say, buffer overflows were when they first came to light, Chess noted. There are not a lot of legacy Ajax applications that will need to be fixed. So, Fortify wants to publicize its

[jQuery] Re: Web 2.0 is vulnerable to attack

2007-04-02 Thread Karl Rudd
Bah, it's not a new vulnerability, it's always been there and always been known about. I call FUD on this. The following is an excerpt that is the keystone of the whole thing: "In an example attack, a victim who has already authenticated themselves to an Ajax application, and has the login coo