Le 12/07/2012 01:17, Jason Orendorff a écrit :
On Mon, Jul 9, 2012 at 6:04 PM, Aymeric Vitte <[email protected]> wrote:
If the answer is that it is not possible because of the same origine policy,
then it is not difficult to show that this policy can be broken already, by
some "manipulations", then it's better to have something clean.
Please do explain what "manipulations" you have in mind here.
As I understand it, the same-origin policy is what prevents other web
sites you visit from sending HTTP requests to your bank (for example),
with your login cookie attached, and looking at the responses. It
seems like it would be a major security hole if that could be easily
circumvented.
-j
Your example is specific, you need first to get the bank cookie which is
not easy. More generally, MDN docs state :
"The same origin policy prevents a document or script loaded from one
origin from getting or setting properties of a document from another
origin."
Then same MDN docs say :
"|window.postMessage| is a method for safely enabling cross-origin
communication. Normally, scripts on different pages are only allowed to
access each other if and only if the pages which executed them are at
locations with the same protocol (usually both |http|), port number
(|80| being the default for |http|), and host (modulo document.domain
<https://developer.mozilla.org/en/DOM/document.domain> being set by both
pages to the same value). |window.postMessage| provides a controlled
mechanism to circumvent this restriction in a way which is secure when
properly used."
Then for example postMessage is breaking the first statement, not saying
that it is not usefull, we did use it here
http://extractwidget.com/#demo, you go on a site, inject the code,
select your gadget and then via iframe and postMessage you login and
record the gadget on our site, but "which is secure when properly used"
indicates that some bad uses could be made.
There is the cross domain xhr with access control too.
But coming back to my point, I am not talking about a download like a
xhr where you can set cookies, do post requests, etc, just a download
that fetch the source, so I don't see it more dangerous than script or
img fetching (or System.load) for example.
--
jCore
Email : [email protected]
Web : www.jcore.fr
Webble : www.webble.it
Extract Widget Mobile : www.extractwidget.com
BlimpMe! : www.blimpme.com
_______________________________________________
es-discuss mailing list
[email protected]
https://mail.mozilla.org/listinfo/es-discuss