|
Message-ID: <CAGUWgD9UDNkNMsixAnLcmS0OuWM0Btvx6fRbRr1OSk1UsXhy2g@mail.gmail.com> Date: Wed, 19 Apr 2023 15:45:36 +0300 From: Georgi Guninski <gguninski@...il.com> To: oss-security@...ts.openwall.com Subject: Checking existence of firewalled URLs via javascript's script.onload There is minor information disclosure vulnerability similar to nmap in browser. It is possible to check the existence of firewalled URL U via the following javascript in a browser: <script src="U" onload="alert('Exists')" onerror="alert('Does not exist')"> This might have privacy implication on potentially "semi-blind CSRF" (XXX does this makes sense?). Works for me in Firefox, Chrome and Chromium 112. I believe the issue won't be fixed because it will break stuff in the mess called internet. For online test: https://www.guninski.com/onload2.html -- guninski: https://j.ludost.net/resumegg.pdf
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.