https://bugzilla.wikimedia.org/show_bug.cgi?id=39180

--- Comment #6 from Bawolff <[email protected]> 2012-08-31 18:04:25 UTC ---

> 
> For the record, I was using the api output in an iframe.... (As part of a js
> thing to allow people to double click on a word, and get the wiktionary
> definition using the xslt parameter of the API)

Specifically I was embedding things like
https://en.wiktionary.org/w/api.php?action=parse&redirects&prop=text&format=xml&xslt=MediaWiki:extractFirst.xsl&page=double-click&lang=en&count=1&showWord=bold
in iframes when people double clicked words. (OTOH I stopped maintaining said
thingy several years ago on account of it being such a kludge, so I'm not even
sure if anyone uses that)

Could we perhaps make the x-frame-options: deny, only go on things that would
be prevented from doing format=json&callback=foo - after all, anything that
could be gleaned from this attack could be much more easily done if one is
allowed to do json-with-callback.

-- 
Configure bugmail: https://bugzilla.wikimedia.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
You are on the CC list for the bug.

_______________________________________________
Wikibugs-l mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/wikibugs-l

Reply via email to