It should be noted that CORSing without discretion can render CSRF protection 
completely useless. If your site adds the Access-Control-Allow-Credentials 
header, malicious sites can detect whether a user is logged in, manipulate user 
data, or do other nasty things to your users. For APIs, though, this generally 
isn't an issue (and who uses cookies with their API anyway?)


----- Original Message -----
From: "Daniel Veditz" <dved...@mozilla.com>
To: pete...@mozilla.com
Cc: "Peter Bengtsson" <pbengts...@mozilla.com>, dev-web...@lists.mozilla.org, 
"Fred Wenzel" <fwen...@mozilla.com>, dev-security@lists.mozilla.org, 
secur...@mozilla.com
Sent: Monday, August 26, 2013 5:54:24 PM
Subject: Re: [webdev] Why not CORS:*?

On 8/26/2013 5:52 PM, Daniel Veditz wrote:
> CORS: * is always safe for a public site, or at least as safe as your
> application is for users of pre-CORS browsers. (maybe not so great for
> intranet sites.)

Meant to include a link to the authoritative blog on the subject:
http://annevankesteren.nl/2012/12/cors-101

-Dan Veditz


_______________________________________________
dev-webdev mailing list
dev-web...@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-webdev
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to