[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5477 [EFF-HTTPS Everywhere]: Surprising DOM origins before HTTPS-E/NoScript redirects have completed



#5477: Surprising DOM origins before HTTPS-E/NoScript redirects have completed
------------------------------------------------------+---------------------
 Reporter:  Drugoy                                    |          Owner:  pde
     Type:  defect                                    |         Status:  new
 Priority:  major                                     |      Milestone:     
Component:  EFF-HTTPS Everywhere                      |        Version:     
 Keywords:  address spoofing, critical vulnerability  |         Parent:     
   Points:                                            |   Actualpoints:     
------------------------------------------------------+---------------------

Comment(by pde):

 mikeperry: the way I'm trying to snag a cookie is by document.writing an
 alert(document.cookie) script into the apple page. It doesn't seem to
 work: I think that write only goes to Apple's ''window'', not Apple's DOM,
 and only until the redirect has completed. So some way of stopping the
 redirect halfway would be necessary to make the fake login page work.

 (In my testing, if it gets any cookies, they're from the attack page, not
 the victim page:

 http://ww2.cs.mu.oz.au/~pde/bugs/5477-tst-cookies.html

 screenshot of (transient) cookie alert:

 http://ww2.cs.mu.oz.au/~pde/bugs/5477-screenshot.png

 )

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5477#comment:13>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs