Am 30.09.2008 um 21:15 schrieb [EMAIL PROTECTED]:


Moritz Onken <[EMAIL PROTECTED]> wrote on 09/30/2008 01:08:38 PM:


Am 30.09.2008 um 19:20 schrieb Ashley:

On Sep 30, 2008, at 10:08 AM, Moritz Onken wrote:
"attackers can use POST"

This is possible due to the fact that flash movies can send any
request to a server.
You can achieve this even with a XMLHTTPRequest.

If scripting is involved that makes it a XSS attack instead, though.
No?

-Ashley

I was wrong about the XMLHttprequest. Posting to another server is not
possible as of the same origin policy.
But flash movies can send post request to a different server without
user interaction.

Actually, no.  Flash can do GET to another server (hostname) but as of
flash 7 (they are at 9 now),  you need a crossdomain.xml file on the
receiving end to allow POST and data loads.

I'm sorry, didn't know about that. But it's still possible to submit a
(invisble) form with the method set to POST without any user interaction
(chapter 2.3 from the paper).

moritz

_______________________________________________
List: [email protected]
Listinfo: http://lists.scsys.co.uk/cgi-bin/mailman/listinfo/catalyst
Searchable archive: http://www.mail-archive.com/[email protected]/
Dev site: http://dev.catalyst.perl.org/

Reply via email to