BugTraq
A technique to mitigate cookie-stealing XSS attacks Nov 05 2002 06:44PM
Michael Howard (mikehow microsoft com) (3 replies)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 11 2002 06:19PM
Jeremiah Grossman (jeremiah whitehatsec com) (1 replies)
RE: A technique to mitigate cookie-stealing XSS attacks Nov 12 2002 12:46AM
Jason Coombs (jasonc science org)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 07 2002 08:26PM
Justin King (justin othius com) (1 replies)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 10 2002 03:21AM
Ulf Harnhammar (ulfh update uu se) (2 replies)
RE: A technique to mitigate cookie-stealing XSS attacks Nov 12 2002 10:43AM
jasonk (jasonk swin edu au)


> -----Original Message-----
> From: Ulf Harnhammar [mailto:ulfh (at) update.uu (dot) se [email concealed]]
> Sent: Sunday, 10 November 2002 2:22 PM
> To: Justin King
> Subject: Re: A technique to mitigate cookie-stealing XSS attacks
>
> On Thu, 7 Nov 2002, Justin King wrote:
>
> > I would be very interested in major browsers supporting a <dead> tag
> with an
> > optional parameter to be a hash of the data between the opening and
> closing
> > dead tag. This tag would indicate that no "live" elements of HTML be
> > supported (e.g., JavaScript, VBScript, embed, object).
>
> I'm not sure if that's the best solution. Lots of code out there do
much
> less filtering than it should, so there will probably be a way to
include
> a </dead> tag and then use all the usual XSS tricks.

I'm not sure it's the best solution either: how many of you have used
code such as <a href='javascript:...'> and so on ?

It's not going to be as easy as it looks - of course if you don't use
javascript AT ALL then sure, but many sites use javascript rollovers and
so on. We need a more effective response than this. Since javascript
(and other client side scripting technologies) are becoming more popular
and functional, it seems like imho the 'best' alternative is the
cookie-blocking approach. This would stop the *effect* of XSS, much the
same as blocking user privileges doesn't stop them running malware but
prevents them from having an effect.

jasonk

> // Ulf Harnhammar
> VSU Security
> ulfh (at) update.uu (dot) se [email concealed]

[ reply ]
Re: A technique to mitigate cookie-stealing XSS attacks Nov 11 2002 08:29PM
Seth Arnold (sarnold wirex com)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 05 2002 09:38PM
Florian Weimer (Weimer CERT Uni-Stuttgart DE) (2 replies)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 08 2002 04:23AM
daw mozart cs berkeley edu (David Wagner)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 06 2002 05:16AM
Valdis Kletnieks vt edu (1 replies)
Re: A technique to mitigate cookie-stealing XSS attacks Nov 08 2002 10:12AM
Florian Weimer (Weimer CERT Uni-Stuttgart DE)


 

Privacy Statement
Copyright 2010, SecurityFocus