[13752] in bugtraq

home help back first fref pref prev next nref lref last post

Re: recent 'cross site scripting' CERT advisory

daemon@ATHENA.MIT.EDU (Taneli Huuskonen)
Tue Feb 8 23:51:48 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Message-Id:  <200002080759.JAA05677@sirppi.helsinki.fi>
Date:         Tue, 8 Feb 2000 09:59:56 +0200
Reply-To: Taneli Huuskonen <huuskone@CC.HELSINKI.FI>
From: Taneli Huuskonen <huuskone@CC.HELSINKI.FI>
X-To:         Ari Gordon-Schlosberg <regs@NEBCORP.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000207175500.A4376@nebcorp.com> from Ari Gordon-Schlosberg at
              "Feb 7, 2000 05:55:00 pm"

-----BEGIN PGP SIGNED MESSAGE-----

Ari Gordon-Schlosberg wrote:

> [Bill Thompson <bill@DIAL.PIPEX.COM>]
> > One form of protection from a truly *cross-site* attack that I didn't
> > see mentioned in the CERT advisory is the trusty "HTTP_REFERER"
[...]
>
> HTTP_REFERER is trivial to spoof, and it's likely that anyone perpetrating
> a sophisticated attack would laugh at having to spoof the Referer: header.
> It's a form of trusting the client, which is a big, huge, no-no.  It's okay

Bill Thompson's comment makes sense in the following scenario.  Suppose
a page on www.evil.com contained a link to www.trusted.com's login page,
with something funny embedded in a query string.  Then an unsuspecting
victim might be tricked into following the link and getting back a page
with evil.com's javascript embedded in it.  Now, if trusted.com's
webserver refused to serve anything else but the index page unless the
Referer: field contained a trusted.com URL, this attack would be foiled.

Now, is there a way to trick a browser into lying about the referrer?

Taneli Huuskonen

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQB1AwUBOJ/M9AUw3ir1nvhZAQEg2QL/VmBUGamGJACoVXCFG8n2G4OQCZk/wGrr
j+wFyzKtFA1YFE6KoIV3I+msJ/QVZJJ8hk6n6Oy45Z5/KkCSdNTQFz7OV+c2v0ua
Q/OXeo/4zUpZNl82Fgdx44rNxu21FkPY
=INX4
-----END PGP SIGNATURE-----
--
I don't   | All messages will be PGP signed,  | Fight for your right to
speak for | encrypted mail preferred.  Keys:  | use sealed envelopes.
the Uni.  | http://www.helsinki.fi/~huuskone/ | http://www.gilc.org/

home help back first fref pref prev next nref lref last post