BugTraq
A technique to mitigate cookie-stealing XSS attacks Nov 05 2002 06:44PM
Michael Howard (mikehow microsoft com) (3 replies)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 11 2002 06:19PM
Jeremiah Grossman (jeremiah whitehatsec com) (1 replies)
RE: A technique to mitigate cookie-stealing XSS attacks Nov 12 2002 12:46AM
Jason Coombs (jasonc science org)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 07 2002 08:26PM
Justin King (justin othius com) (1 replies)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 10 2002 03:21AM
Ulf Harnhammar (ulfh update uu se) (2 replies)
RE: A technique to mitigate cookie-stealing XSS attacks Nov 12 2002 10:43AM
jasonk (jasonk swin edu au)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 11 2002 08:29PM
Seth Arnold (sarnold wirex com)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 05 2002 09:38PM
Florian Weimer (Weimer CERT Uni-Stuttgart DE) (2 replies)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 08 2002 04:23AM
daw mozart cs berkeley edu (David Wagner)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 06 2002 05:16AM
Valdis Kletnieks vt edu (1 replies)
On Tue, 05 Nov 2002 22:38:32 +0100, Florian Weimer <Weimer (at) CERT.Uni-Stuttgart (dot) DE [email concealed]> said:

> What about HTTP headers which advise user agents to disable some
> features, e.g. read/write access to the document or parts of it via
> scripting or other Internet Explorer interfaces?
>
> Is anybody interested in writing an Informational RFC on this topic?

Pointless.

It's one thing for a web browser to refuse to do something because it suspects
that it has been asked something underhanded (for instance, to not give a
cookie value to a script if it were tagged 'httponly').

It's something else for a server to try to restrict user agents that way.
A well-behaved user agent won't need the hints, and a malicious one won't
listen to them....

(Note - I'm talking here about a server trying to say "Thou Shalt Not Do
XYZ" and expecting to be listened to - if anything, this is a big clue to
the attacker that they should look for a way to try to do XYZ anyhow. That
never works. On the other hand, there are *lots* of areas where *HINTS*
(like the HTTP 'Expires' header) are quite valuable...

Remember - we've seen enough Bugtraq postings about people who try to use
hidden fields in an HTML document for security, and get it wrong...
--
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech

[ reply ]
Re: A technique to mitigate cookie-stealing XSS attacks Nov 08 2002 10:12AM
Florian Weimer (Weimer CERT Uni-Stuttgart DE)


 

Privacy Statement
Copyright 2010, SecurityFocus