On Feb 28, 2008, at 4:56 PM, Wade Preston Shearer wrote:

You defeat the purpose of CSRF by going outside the domain to use the
script. CSRF attacks go after already applied authentication by using it against the user (using their security auth to do something malicious ).

I wasn't referring to CSRF. I was showing how the shopping cart/ MySpace example wasn't a valid reason against using REQUEST as the hacker can fake-post to the shopping cart just as east as he can fake-get to the shopping cart, both without user interaction.

Sure, a hacker can fake-GET or fake-POST and guess at the credentials. But in a CSRF, the hacker causes the user's browser to do a GET WITH the user's own cookies, which may mean the user is authenticated. Correct me if I'm wrong, but the hacker cannot force the browser to do a POST, WITH the users cookies for that domain, without user intervention.



_______________________________________________

UPHPU mailing list
[email protected]
http://uphpu.org/mailman/listinfo/uphpu
IRC: #uphpu on irc.freenode.net

Reply via email to