- From: Emil Lundberg <noreply@github.com>
- Date: Thu, 26 May 2022 07:37:37 -0700
- To: public-webauthn@w3.org
Branch: refs/heads/issue-1731-code-injection-cons Home: https://github.com/w3c/webauthn Commit: 4442cb39a36a59b14a03c28462167873a5798b13 https://github.com/w3c/webauthn/commit/4442cb39a36a59b14a03c28462167873a5798b13 Author: Emil Lundberg <emil@yubico.com> Date: 2022-05-26 (Thu, 26 May 2022) Changed paths: M index.bs Log Message: ----------- Narrow claim about MitM resistance to tampering specifically As noted in issue #1731: Under the given assumption alone, the ceremony is not necessarily resistant to code injection MitM attacks that execute on a legitimate origin but exfiltrate the assertion to a malicious remote server. Commit: e08a231aba85a24db4db68c3ba66e1564adf62b5 https://github.com/w3c/webauthn/commit/e08a231aba85a24db4db68c3ba66e1564adf62b5 Author: Emil Lundberg <emil@yubico.com> Date: 2022-05-26 (Thu, 26 May 2022) Changed paths: M index.bs Log Message: ----------- Add security consideration: Code injection attacks This addresses issue #1731. See: https://github.com/w3c/webauthn/issues/1731 Compare: https://github.com/w3c/webauthn/compare/4442cb39a36a%5E...e08a231aba85
Received on Thursday, 26 May 2022 14:37:48 UTC