[html5] r4641 - [at] (0) warn about a possible security problem if you don't check the websocket [...]
whatwg at whatwg.org
whatwg at whatwg.org
Mon Feb 1 03:17:01 PST 2010
Author: ianh
Date: 2010-02-01 03:16:57 -0800 (Mon, 01 Feb 2010)
New Revision: 4641
Modified:
complete.html
source
Log:
[at] (0) warn about a possible security problem if you don't check the websocket handshake carefully on the server.
Modified: complete.html
===================================================================
--- complete.html 2010-02-01 08:41:35 UTC (rev 4640)
+++ complete.html 2010-02-01 11:16:57 UTC (rev 4641)
@@ -68234,6 +68234,18 @@
purposes. Their semantics are equivalent to the semantics of the
HTTP headers with the same names.</p>
+ <p class=warning>If a server reads fields for authentication
+ purposes (such as <code title="">Cookie</code>"), or if a server
+ assumes that its clients are authorized on the basis that they can
+ connect (e.g. because they are on an intranet firewalled from the
+ public Internet), then the server should also verify that the
+ client's handshake includes the invariant "Upgrade" and
+ "Connection" parts of the handshake. Otherwise, an attacker could
+ trick a client into sending Web Socket frames to a server
+ (e.g. using <code>XMLHttpRequest</code>) and cause the server to
+ perform actions on behalf of the user without the user's
+ consent.</p>
+
</dd>
</dl><p>A final field consisting of the empty string (two consecutive
Modified: source
===================================================================
--- source 2010-02-01 08:41:35 UTC (rev 4640)
+++ source 2010-02-01 11:16:57 UTC (rev 4641)
@@ -77898,6 +77898,18 @@
purposes. Their semantics are equivalent to the semantics of the
HTTP headers with the same names.</p>
+ <p class="warning">If a server reads fields for authentication
+ purposes (such as <code title="">Cookie</code>"), or if a server
+ assumes that its clients are authorized on the basis that they can
+ connect (e.g. because they are on an intranet firewalled from the
+ public Internet), then the server should also verify that the
+ client's handshake includes the invariant "Upgrade" and
+ "Connection" parts of the handshake. Otherwise, an attacker could
+ trick a client into sending Web Socket frames to a server
+ (e.g. using <code>XMLHttpRequest</code>) and cause the server to
+ perform actions on behalf of the user without the user's
+ consent.</p>
+
</dd>
</dl>
More information about the Commit-Watchers
mailing list