Yes, but one thing was missing in that explanation, which I only 
realized later on..
Flash allows she so-called CSRF attacks to be done cross-domain, the 
best example is the Myspace worm that popped up a while ago..

Imagine this scenario:

   1. You logged in to www.myspace.com, which allows all domains using
      crossdomain.xml (in this example)
   2. The session cookie persists, so as long as you don't close your
      browser you will remain to be logged in
   3. Now you go to www.evilsite.com, which has an evil swf
   4. The swf can make use of your session cookie and perform actions on
      your behalf on myspace.com, such as changing your password, etc etc.

Evert

Michael Stuhr wrote:
> Evert | Rooftop schrieb:
>> Might be interesting:
>>
>> http://www.hardened-php.net/library/poking_new_holes_with_flash_crossdomain_policy_files.html
>>  
>>
>>
>> Evert
>>
>>
>> _______________________________________________
>> osflash mailing list
>> [email protected]
>> http://osflash.org/mailman/listinfo/osflash_osflash.org
>>
> i read that twice now, maybe it's little late, but i don't get it.
>
> mike once illustrated the use of crossdomain.xml very well, maybe he 
> can do it again, when he's finished reading his e-mails :-)
>
> micha
>


_______________________________________________
osflash mailing list
[email protected]
http://osflash.org/mailman/listinfo/osflash_osflash.org

Reply via email to