Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - GMail POST Mortem: Can You Handle CSRF?->

Submitted by
Giorgio Maone
Giorgio Maone writes "This week couldn't be worse for Google and GMail: four distinct vulnerabilities disclosed in the past few days, plus a Google Docs weakness by Rios/McFeters allowing for easy Flash-based XSS, and now another GMail hijacking technique half-disclosed (!) by Petko H. Petkov (AKA pdp).

GMail POST Mortem analyzes the details published by Petko under his ambiguous "semi-disclosure" policy, and it shows how this is in facts a 0 day full disclosure, since building a working exploit from it is pretty trivial. Finally, countermeasures against the CSRF (the class of vulnerabilities which this one belongs to) are provided, both for developers and for users.

BTW, the GMail hole is still unpatched (tested 1 minute ago)."

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

GMail POST Mortem: Can You Handle CSRF?

Comments Filter:

Simplicity does not precede complexity, but follows it.

Working...