[2513] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

COOKIE redirection to executable file (was: Re: Bloody cookies...)

daemon@ATHENA.MIT.EDU (Gene Ingram)
Tue Jul 23 16:55:05 1996

Date: Tue, 23 Jul 1996 10:35:39 -0700
From: Gene Ingram <gene@hpfsvr01.cup.hp.com>
Reply-To: www-security@ns2.rutgers.edu
To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

> Could we possibly direct this thread in the direction of how cookies are a threat to
> corporate data?  What is a system administrator worried about as pertains cookies?  I
> have my users running a networked copy of Netscape with cookies.txt attributed
> read-only.  What else?

Well, I'll start the discussion on that track by stating my 
concerns about a redirected cookies file to null.  Let's discuss 
WHERE ELSE a cookie file can be REDIRECTED.  For example, can it 
be redirected to another file which is executable and located in 
a web server executable directory, and can the cookie information 
include commands which execute upon going to this directory and 
calling up the file in any web browser?
  
This would create a dynamic script controlled by a mother ship of 
unknown origin, would it not?  Here is a concern that has bothered 
me for some time, and I believe might fall under the purview of 
this list and relates to cookies.  (If it does not, please delete 
from mailbox.)

-- 
___
 | ._  _ ._ _.._ _    ``I do not fear computers
_|_| |(_|| (_|| | |     I fear lack of them.''  -Isaac Asimov
_____  _|  _______________________________________________________
Key fingerprint:  93 E1 15 E6 35 BC B2 84  B2 7B 39 76 29 72 32 72
 [Signature lettering created by ``Figlet Ascii Font Converter''
  http://mediacube.datacom.de/cgi-bin/moniteurs/figlet]

home help back first fref pref prev next nref lref last post