Update: note for new readers
I probably can't answer your questions about the attack. If bad things have happened to your journal, as a result of this attack or otherwise, please
file a support requestIf you got bitten by a new attack on LJ that's recently become popular, and someone directed you here for more information, I'm sorry but you've
(
Read more... )
Yes, they're lame, but they exist.
Maybe we only do the secret-expiry/value check if there's a referer. (from anywhere: LiveJournal or external)
Then clients who just do an /update.bml POST are unaffected.
?
Reply
Reply
If they don't, then you could just allow POSTs that have no referer field (bad LJ clients) or have the appropriate referer (the normal update page).
The only issue is really if these broken LJ clients are just websites, because then the browser will set the referer.
Reply
It's cookie authentication which is the problem, because you can make people's browsers do things on other websites and the cookies show it's them. If these clients don't use cookie authentication - which I suspect they don't - then using the secret-expiry/value check when cookies are used for authentication means everybody's happy.
Reply
(The comment has been removed)
secondly: for the third-party to get your secret code server-side it would need your cookies :) (which it wouldn't have). OR client side, it would need to access content of another cookied frame etc. (which, IE security non-permitting, it doesn't have access to)
Reply
Cross-site scripting restrictions should prevent them from finding out what any of the user's MACs are from forms requested by the user.
Reply
(The comment has been removed)
Reply
one possible option would be for a secret expiry to be only set when another secret is requested for that type of post. again still some problems.
- secret requested for posting entry: secret1 returned
- secret requested for adding a friend: secret2 returned
- secret requested for posting an entry: secret3 returned, expiry set on secret1
etc.
Reply
Reply
Reply
See source of http://darkman.4host.ru/kolbasa/addfriend.htm.
Reply
Reply
Reply
Besides, breaking existing apps is always acceptable when you close a security hole.
Reply
Leave a comment