- From: Emil Lundberg <noreply@github.com>
 - Date: Thu, 26 May 2022 07:37:37 -0700
 - To: public-webauthn@w3.org
 
  Branch: refs/heads/issue-1731-code-injection-cons
  Home:   https://github.com/w3c/webauthn
  Commit: 4442cb39a36a59b14a03c28462167873a5798b13
      https://github.com/w3c/webauthn/commit/4442cb39a36a59b14a03c28462167873a5798b13
  Author: Emil Lundberg <emil@yubico.com>
  Date:   2022-05-26 (Thu, 26 May 2022)
  Changed paths:
    M index.bs
  Log Message:
  -----------
  Narrow claim about MitM resistance to tampering specifically
As noted in issue #1731: Under the given assumption alone, the ceremony is not
necessarily resistant to code injection MitM attacks that execute on a
legitimate origin but exfiltrate the assertion to a malicious remote server.
  Commit: e08a231aba85a24db4db68c3ba66e1564adf62b5
      https://github.com/w3c/webauthn/commit/e08a231aba85a24db4db68c3ba66e1564adf62b5
  Author: Emil Lundberg <emil@yubico.com>
  Date:   2022-05-26 (Thu, 26 May 2022)
  Changed paths:
    M index.bs
  Log Message:
  -----------
  Add security consideration: Code injection attacks
This addresses issue #1731.
See: https://github.com/w3c/webauthn/issues/1731
Compare: https://github.com/w3c/webauthn/compare/4442cb39a36a%5E...e08a231aba85
Received on Thursday, 26 May 2022 14:37:48 UTC