A security researcher has discovered a weakness in a core browser protocol that compromises the security of Google, Facebook, and other websites by allowing an attacker to tamper with the cookies they set. The weakness stems from RFC 2965, which dictates that browsers must allow subdomains (think www.google.com) to set and read …
Surely some of this is easily avoided
Paris, 'cos even she's not as wide open as reports suggest.
Just one question
Is Firefox concerned by this exploit or not ?
Am I missing something here?
Cookie data is effectively user input. Any web app that doesn't sanitise user inputs gets what it deserves. Even if some student's project is insecure, that's no excuse for fuck ups elsewhere.
Stop the press...
Whoa, you mean that messy security on subdomain.mydomain.com can affect mydomain.com, too? Now that's a _whole_ new concept!
(For those from Beteigeuze, now's the right time to switch on your irony detector.)
So my navel-lint blog is compromised?
- Boffins attempt to prove the UNIVERSE IS JUST A HOLOGRAM
- Review Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
- MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
- +Comment 'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
- Apple tried to get a ban on Galaxy, judge said: NO, NO, NO