Can you provide any documentation on the details of this exploit?

On Wed, Sep 30, 2015 at 12:50 PM, Daniel Friesen <dan...@nadir-seen-fire.com
> wrote:

> Bug? There is nothing that can be fixed.
>
> You just have to accept that as long as the login page is on the same
> domain as site scripts, there is no way to stop those scripts from
> controlling the login page.
>
> ~Daniel Friesen (Dantman, Nadir-Seen-Fire) [http://danielfriesen.name/]
>
> On 2015-09-30 9:33 AM, Tyler Romeo wrote:
> > Is there a bug filed for that?
> > On Sep 30, 2015 12:13, "Daniel Friesen" <dan...@nadir-seen-fire.com>
> wrote:
> >
> >> On 2015-09-30 8:48 AM, Chris Steipp wrote:
> >>> * We disable site and user .js on Special:UserLogin, so a malicious
> admin
> >>> can't add password sniffing javascript to the login page
> >> Note that you can make use of pushState to render this protection moot
> >> for anyone who clicks the login link instead of directly visiting
> >> UserLogin page. Which is practically everyone.
> >>
> >> ~Daniel Friesen (Dantman, Nadir-Seen-Fire) [http://danielfriesen.name/]
> >>
> >>
> >> _______________________________________________
> >> MediaWiki-l mailing list
> >> To unsubscribe, go to:
> >> https://lists.wikimedia.org/mailman/listinfo/mediawiki-l
> >>
> > _______________________________________________
> > MediaWiki-l mailing list
> > To unsubscribe, go to:
> > https://lists.wikimedia.org/mailman/listinfo/mediawiki-l
>
>
> _______________________________________________
> MediaWiki-l mailing list
> To unsubscribe, go to:
> https://lists.wikimedia.org/mailman/listinfo/mediawiki-l
>
_______________________________________________
MediaWiki-l mailing list
To unsubscribe, go to:
https://lists.wikimedia.org/mailman/listinfo/mediawiki-l

Reply via email to