So, the whole W3C security idea is to prevent pre-population of filefields...right?
I guess it wouldn't be possible to allow the functionality only when a user is uploading files from their own system and not from an external source? Or is that what the proposed Javascript and Active X alternatives do? Rick -----Original Message----- From: Jim [mailto:[EMAIL PROTECTED] Sent: Thursday, May 25, 2006 5:51 AM To: CF-Talk Subject: Re: Any reason why a file field can be submitted back to the page it's on? I could make a website which has a form and filefield pre populated with C:\WINDOWS\system32\config\SAM You visit my website using a machine running windows I log your IP and auto submit the form using javascript I now have the IP of your machine and the logins to your machine Rick Faircloth wrote: > I guess I just don't understand what the vulnerability is when HTML > is allowed to pull back into a form the path info for a file field upon > resubmission. > > Can you give me a concrete example of an exploit that can be built > into a website that might be used if the change I suggested occurred. > > And, no, I wouldn't want everyone to have to stop wearing a helmet > just because I might choose to not wear one. But that's a bogus > argument anyway. If lawmakers were really trying to save money > from uninsured motorists injuries, they would force car drivers to > wear helmets, also, which would protect far, far greater numbers > of injured, uninsured motorists. But they don't do that...why? > Because it would be a great inconvenience to the vast majority of > lawmakers who never ride a motorcycle. So, if it doesn't affect them, > they don't care. > > Rick > > -----Original Message----- > From: Dave Watts [mailto:[EMAIL PROTECTED] > Sent: Thursday, May 25, 2006 1:32 AM > To: CF-Talk > Subject: RE: Any reason why a file field can be submitted back to the > page it's on? > > > >> You mean that a malicious programmer could be hired by >> someone to code web pages for them and then take advantage of >> the person hiring them. Am I understanding? >> >> If that's the case, then I still think that burden should be >> on the person hiring the programmer...get someone you >> trust...if you don't trust them, don't hire them. >> > > No, that's not what I meant at all. I meant exactly what I wrote: any > malicious programmer could exploit it in their own web pages. Just like > malicious programmers exploited ActiveX vulnerabilities in IE, and > cross-site scripting vulnerabilities, etc, etc. If the browser lets you do > something, it lets ANYONE do that thing, not just Rick the trustworthy > programmer. > > Dave Watts, CTO, Fig Leaf Software > http://www.figleaf.com/ > > Fig Leaf Software provides the highest caliber vendor-authorized > instruction at our training centers in Washington DC, Atlanta, > Chicago, Baltimore, Northern Virginia, or on-site at your location. > Visit http://training.figleaf.com/ for more information! > > > > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Message: http://www.houseoffusion.com/lists.cfm/link=i:4:241431 Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4 Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4 Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4 Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

