Recently, xiaonei.com (a Chinese social-networking site, similar to Facebook) fixed a cross-site scripting (XSS) vulnerability known as “HTTP Response Splitting.” This flaw occurs when a web application does not properly filter carriage returns and linefeeds (%0d%0a). This allows an attacker to split the HTTP response header like so: HTTP/1.1 200 OK ”¦ Set-Cookie: _de=a\r\n\r\n <script>alert(/XSS/);</script>; Read more…
Two weeks ago, I wrote a blog about “clickjacking,” the method of using invisible links to malicious web sites. Users click on what appear to be legitimate buttons, for example, but are actually taken to sites they can’t see. I think clickjacking will be combined with other vulnerabilities to attack users, who will be unaware Read more…
Tags: clickjacking, web
[This entry was updated on November 3.] Lately, the topic of “clickjacking” has gained popularity in discussions on the Internet. It is a new type of web attack. I decided to find out what it’s all about. I found an online video from OWASP NYC AppSec 2008 here. In the video, Jeremiah Grossman and Robert Read more…
Tags: clickjacking, web
Posts tagged under web