There are issues on the LJ issue tracker board concerning this.
I've just
filed my own bug against Firefox. (LJ *need* to fix their end, but there are things the browser can do to prevent this too, that are low-impact. Hopefully Mozilla/Firefox will implement a block for the next version. Good luck waiting for Microsoft to fix Internet Explorer
(
Read more... )
Comments 14
(The comment has been removed)
And you could come up with a combination exploit. Something that started off as something like the sausage meme, that people might actually want to keep, but then some time later after enough people had the entries the back end script could be changed to something more damaging.
A lot of those affected might not know how to deal with it, and if it was something more subtle like adding to the friends list then many might not even notice it. Potentially very nasty.
Reply
Reply
Reply
Reply
ciphergoth has started a thread in lj_dev here.
-roy
Reply
Instead, I think the correct fix is not to present cookies in cross-site POST requests - or at least, to ask the user before doing so.
Reply
Reply
I've always been given to understand that GET requests are not supposed to change anything, only request things. If servers enforce that, then this will work. If they don't, it doesn't...
Reply
That said, real-world usage differs; consider: www.somewhere.com/getwebcounterimg.php?page=214&action=increment as a first example.
Reply
Reply
But it could.
And if LJ don't protect themselves, *someone* *will* do something bad with it.
There are already proff-of-concept scripts that modify the friends list of an 'unsuspecting' user. Anything I've suggested is possible. We're just waiting to see who gets there first: the LJ staff protecting against it, or the first real malicious use of this technique.
Reply
Leave a comment