[I've been using the term 'insecurity by design' for some time now, to convey 
that a great deal of what consumer devices suffer from isn't 'bugs', or bugs 
retrospectively re-named features, but actual 'features', intentionally put 
there in order to ensure that parties other than the user of the device and 
software have power over its behaviour.

[Here's a nice addition to the document collection.

[Note that Microsoft is merely more brazen than Google, Apple, Mozilla and all 
the other consumer-hostile providers.  Those suppliers pay lip-service, and 
'fix' their designed-in insecurity 'features' when they become sufficiently 
widely known to become embarrassing.]


Microsoft won't patch Edge XSS vulnerability
Content security policy bypass is 'by design'.
Juha Saarinen
itNews
Sep 7 2017
https://www.itnews.com.au/news/microsoft-wont-patch-edge-xss-vulnerability-472746

Cisco Talos security researchers have found a way to bypass the content 
security policy defence mechanism that protects against cross site scripting 
attacks in multiple web browsers.

The flaw has been patched in recent versions of Google Chrome and WebKit-based 
browsers (such as Apple Safari for macOS and iOS), but not in Microsoft's Edge 
for Windows 10.

"Microsoft stated this is by design, and has declined to patch this issue," 
Talos said.
CSP prevents cross-site scripting attacks by whitelisting servers that can be 
used as sources for client-side web application code.

To exploit the vulnerability, a web page can be coded to set the browser CSP to 
unsafe-inline which allows for inline scripts to run.

The web page will then load a new document with the window.open Javascript 
method, adding code to it with document.write to enable cross-site 
communications. 

Talos researcher Nicholas Grødum said while browsers such as Firefox work as 
per the explicit W3C specifications and inherit CSP restrictions from the 
loading document, Microsoft Edge does not. 

Talos reported the vulnerability to Microsoft in November last year. Microsoft 
confirmed the issue in January 2017, but said in March this year that it did 
not consider it a vulnerability.

Cross-site scripting (XSS) is a widespread attack vector against web 
applications, and can be used to run malicious scripts that glean sensitive 
information from browsers, unbeknownst to users.

-- 
Roger Clarke                                 http://www.rogerclarke.com/
                                    
Xamax Consultancy Pty Ltd      78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Tel: +61 2 6288 6916                        http://about.me/roger.clarke
mailto:[email protected]                http://www.xamax.com.au/

Visiting Professor in the Faculty of Law            University of N.S.W.
Visiting Professor in Computer Science    Australian National University
_______________________________________________
Link mailing list
[email protected]
http://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to