This report describes a vulnerability type called SDRF. There are several examples that demonstrate the risk of the above-mentioned class of vulnerability. Causes of its existence and methods of protection from SDRF are also observed in the report.
SDRF – the Same Domain Request Forgery. Like the known CSRF (Cross-Site Request Forgery) vulnerability, SDRF falsifies HTTP requests of users, but in contrast to CSRF, it forges the requests, that are send by a user to the same domain, where the malicious code, that exploits the vulnerability, is located.
Download: PDF
Video Demo: Google Mail under Opera XSS attack PoC ( Opera v10.63 and 11 )
Volut-ID | World News Articles
All news of interest and can provide an info for you, and so can assist in the search for new news.
About news gadgets, mobile phones
info about the latest mobile phone, from news, features, and the most mobile phone models in search of the world.
SDRF Vulnerability in Web-Applications and Browsers
Related Post
Browser
- Nuf-Fuzzer v.0.1 Pre-release
- Google Chrome Pwned
- Google Chrome Pwned
- Mozilla Firefox Internals & Attack Strategies
- Mozilla Firefox Internals & Attack Strategies
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- Leaking browsing history via user interaction and side channel attacks
- Leaking browsing history via user interaction and side channel attacks
- Comitari : Web Protection Suite
- Comitari : Web Protection Suite
- Critical vulnerability in Opera web browser
- Critical vulnerability in Opera web browser
- XSS Rays - Google Chrome Browser Extensions
- XSS Rays - Google Chrome Browser Extensions
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- BeEF v0.4.2.1 released
- BeEF v0.4.2.1 released
- Websecurify 0.8Beta1 released
- Websecurify 0.8Beta1 released
- WEB BROWSER SECURITY SOCIALLY-ENGINEERED MALWARE PROTECTION
- WEB BROWSER SECURITY SOCIALLY-ENGINEERED MALWARE PROTECTION
- SDRF Vulnerability in Web-Applications and Browsers
Papers
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- 2011 Data Breach Investigations Report
- 2011 Data Breach Investigations Report
- Mozilla Firefox Internals & Attack Strategies
- Mozilla Firefox Internals & Attack Strategies
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- Credit Card skimming and PIN harvesting in an EMV world
- Credit Card skimming and PIN harvesting in an EMV world
- Exposing the Lack of Privacy in File Hosting Services
- Exposing the Lack of Privacy in File Hosting Services
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Leaking browsing history via user interaction and side channel attacks
- Leaking browsing history via user interaction and side channel attacks
- HTTP Geolocation
- HTTP Geolocation
- HITB Magazine Issue 005 released
- HITB Magazine Issue 005 released
- Symantec Report on Attack Kits and Malicious Websites
- Symantec Report on Attack Kits and Malicious Websites
- Trustwave's Global Security Report 2011: Web Application Risks
No response to “SDRF Vulnerability in Web-Applications and Browsers”
Leave a reply