Waldo ? wrote:

> http://www.nytimes.com/2001/02/05/technology/05JAVA.html

NYTimes requires you to log in. You can use an account I created; 
login-name "ihatetracking45"; password starts with "i" and ends with 
"5", guess it :).

Excerpt: Using JS and the DOM, a script in an HTML msg can grab the 
content of the viewed msg and then submit it to a web form 
automatically. This is not very interesting during the first read, but 
gets interesting, if it's quoted or forwarded in an HTML mail and then 
read by a vulnerable user - the newly added comment can also be sniffed.

Proecting yourself is easy: Turn off JavaScript.
To protect your msg from potentially vulnerable recipients of your 
replies / forwards, we have to strip JS from quoted or inline-forwarded 
msgs. (Sending as plaintext will do that already, of course - I'm 
talking about HTML msgs.)
I see no real protection for msgs forwarded as attachment, unless we 
drop the strategy of always attaching verbatim and assuming the 
recipient is vulnerable.

To do:
- Disable JavaScript in Mailnews (done by default in Mozilla and Beonex 
Communicator, not Netscape 6)
- During quoting or forwarding inline, remove all JS and similar cruft
- During reading, treat attachments as separate msgs (not the same msg), 
so the forwarded msg has no access to the main body.

mstoltz, if you have a bug filed about that, can you please open it and 
quote the number her?

-- 
This message is protected by ROT0 encryption and the DMCA.
Reading is disallowed and will be prosecuted.

Reply via email to