[wellylug] javascript

V K list0570 at paradise.net.nz
Fri Aug 2 14:19:27 NZST 2002


> If it was to run inside a sandbox (which I had some reasonable level of
> trust in), yes.  Javascript scripts aren't "any binary".

You don't have this sandbox in your browser.

Unless you carefully examine all the javascript in a text editor first,
that javascript is equivalent to "any binary".

> Yes; but there can be bugs in your HTML parser and renderer and
> supporting infrastructure, too, that could allow an attacker to get

Very very difficult to exploit.

> control of your PC (although admittedly not in as nearly a portable
> fashion as some javascript implementation bugs) - for example, the

Javascript opens up many more possibilities. In theory, there should be
a javascript-sandbox inside the browser. In practice it has been broken
many times. No javascript, no cross-site-scripting attacks. Remember
when the sandbox failed for frames, and it was possible to steal
cookies from any frame? How difficult would it be to steal any cookie
with javascript? With html I'd have to fake the server's URL, and then
it's not a security problem of the browser any more.

The risk with javascript and html is significantly larger than just
with html.

Volker

-- 
Volker Kuhlmann			is possibly list0570 with the domain in header
http://volker.orcon.net.nz/		Please do not CC list postings to me.


  .-.   Wellington
  /V\   Linux
 // \\  Users       
/(   )\ Group
 ^^-^^
        http://wlug.paradise.net.nz/

To unsubscribe from this group, send an email to:
wellylug-unsubscribe at egroups.com
  

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 




More information about the wellylug mailing list