So the issue is not confidentiality, it is inappropriate script execution. Got it.

Thanks Anne

regards, Frederick

Frederick Hirsch
Nokia



On Jul 1, 2009, at 5:34 AM, ext Anne van Kesteren wrote:

I might not have time to address your larger set of questions before I
leave on vacation tomorrow, but I thought I could at least answer this one.

On Tue, 30 Jun 2009 17:38:20 +0200, Frederick Hirsch
<frederick.hir...@nokia.com> wrote:
One additional question regarding a cross-site get (using browser here
for simplicity of terms) (for example, see [1])

Is it true that

1. the GET results in the content being returned on the wire with a
Access-Control-Allow-Origin header
2. the browser then checks this header and enforces policy
3. if policy disallows then the browser does not allow the content to be
used.

Yes, this is correct.


In any case, doesn't this open an attack to get the content by sniffing
the wire for the response content, regardless of the header?

If that is a viable attack scenario such servers are already exposed due to e.g. cross-origin <img> or <iframe> loading which already works today. Or e.g. by simply setting window.location to the address from which you
want to sniff the response.

All the header is effectively protecting is exposing the "raw" contents of
a cross-origin resource to script.


[1] http://arunranga.com/examples/access-control/SimpleXSInvocation.txt


--
Anne van Kesteren
http://annevankesteren.nl/


Reply via email to