|
[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message] Re: XInclude: security risk 1
Elliotte Rusty Harold wrote, > This is still probably less dangerous than the XInclude version of > the attack because for it to succeed gandalf not only needs to exist, > it must return something that can plausibly fit into an XML document: > either XML or plain text that doesn't contain & or <. XInclude can > use parse="text" to open up a lot more possibilities. > > The IMG case in HTML is qualitatively different. The success or > failure of the loading of one IMG element is unrelated to the loading > of anything else. As far as I've been able to devise, there's no > direct way to communicate the result back to another host. (Perhaps > JavaScript can do it. I really don't know.) It's hard to say. It's likely to be highly implementation dependent. For instance, the victim might return different error responses depending on whether the document is unprocessable due to an unretrievable external entity or because it's otherwise ill-formed or invalid. Good catch, BTW. Cheers, Miles
|
PURCHASE STYLUS STUDIO ONLINE TODAY!Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced! Download The World's Best XML IDE!Accelerate XML development with our award-winning XML IDE - Download a free trial today! Subscribe in XML format
|
|||||||||

Cart








