On Sun, September 28, 2008 23:52, Stefan Fritsch wrote: > I don't think is accurate. The browser will happily send the session > cookie unencrypted even if the target webserver gives e.g. a 302 or 404 on > the corresponding http URL. If a proxy is used, the squirrelmail server > doesn't even need to have port 80 open. All an attacker has to do is lure > the victim to a page that has an http link to the squirrelmail server as > an inline image and snoop the http request from the victim's browser.
Hmm, I didn't realise that that would also work. Still, because of the behaviour change I'm not eager to push it in a DSA. Thijs _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/secure-testing-commits