Ron Savage wrote:

>>> o Add the session id to the URL. This method has the most problems, and
>>> is not recommended.
>>>
>>> The session id is generated by CGI::Session.
>> Surely 1 and 3 are the same (except possibly you are talking about a post vs 
>> get)?
> 
> Not really.
> 
>> What are the problems with the last option? This is the way I have to 
>> approach it as I can't rely on the browsers I am dealing with to allow 
>> cookies. It's worked fine up to now... 
> 
> Google for XSS - Cross-site scripting attacks, as a starter.

Maybe I'm being dense, but XSS is about letting user's embed HTML/JS into other
documents. So you need to protect against nefarious JS folks. How does putting
the session id in the URL cause XSS problems? XSS is all about *escaping* user
entered data when outputting it.

-- 
Michael Peters
Developer
Plus Three, LP


#####  CGI::Application community mailing list  ################
##                                                            ##
##  To unsubscribe, or change your message delivery options,  ##
##  visit:  http://www.erlbaum.net/mailman/listinfo/cgiapp    ##
##                                                            ##
##  Web archive:   http://www.erlbaum.net/pipermail/cgiapp/   ##
##  Wiki:          http://cgiapp.erlbaum.net/                 ##
##                                                            ##
################################################################

Reply via email to