[Home] [By Thread] [By Date] [Recent Entries]


At 12:01 PM +0000 1/8/04, Alaric B Snell wrote:

>Indeed, in particular because sites with varying levels of security 
>such as Amazon will use a cookie to identify you so you can alter 
>your personal details, see stuff customised, and so on, but when you 
>go to actually order they ask you to enter your password again.
>

OK. That's something. On sites that implement this properly, 
rerequesting the password for ordering closes some holes and most 
importantly removes some of the financial incentive for exploiting 
this vulnerability since you couldn't use it to order a computer for 
yourself. Of course, there's still one-click, through which I suspect 
someone could drop a few hundred copies of "Embarassing Sex 
Practices" on your doorstep, but that sort of thing is mostly 
annoying and more of a prank than any real threat. I feel a little 
better about this now.

You could still use this attack to get into a company's private data 
such as the W3C member pages, though. (Well, no those pages exactly. 
They're protected by HTTP authentication; but any similar group of 
confidential pages that uses cookies for authorization.)

-- 

   Elliotte Rusty Harold
   elharo@m...
   Effective XML (Addison-Wesley, 2003)
   http://www.cafeconleche.org/books/effectivexml
   http://www.amazon.com/exec/obidos/ISBN%3D0321150406/ref%3Dnosim/cafeaulaitA

Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member