?A discussion has been going on in W3C public-html about a proposed 
`rel=anonymous` feature that would suppress cookies, auth, referrer headers, 
etc. The purpose would be to use that rel attribute value on static resources 
to improve performance, by cutting down on unnecessary headers being sent in 
the request.

http://www.w3.org/Bugs/Public/show_bug.cgi?id=11235

It was brought up by Billy Hoffman (http://zoompf.com) that some web 
applications have very sensitive sessions and they are set up to expire the 
session (ie, log the person out) if a request is received that has no session 
cookie header in it, etc. The assertion was that this type of thing would be a 
potential DoS attack vector, by allowing an unrelated website to include a 
hidden <img rel=anonymous> request in their markup that made a request to a 
site known to log out on such non-cookie requests, and thus effectively logging 
users out of the app without their control/knowledge.

Whether this is or is not a valid attack vector is possibly open to discussion. 
But it was brought up that if it is valid, then the same issue mihght also 
affect CORS xhr requests. I was asked to bring this issue up here to see if 
anyone has any knowledge or thoughts on that potential issue/vulnerability for 
CORS xhr?


--Kyle

Reply via email to