- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Mon, 26 Mar 2007 13:39:02 -0400
- To: "Johnathan Nightingale <johnath" <johnath@mozilla.com>
- Cc: W3C WSC Public <public-wsc-wg@w3.org>
Received on Monday, 26 March 2007 17:39:07 UTC
There is not currently a "2.A.i", and several others you cite. Mez Johnathan Nightingale <johnath@mozilla.com> Sent by: public-wsc-wg-request@w3.org 03/23/2007 10:24 AM To W3C WSC Public <public-wsc-wg@w3.org> cc Subject ACTION-164 - Elaborate Cross Site Scripting in Wiki Hello all, I've updated the Threat Trees page of the Wiki with more detailed information on cross site scripting. I've also made some minor editorial changes, more clearly calling out the description and goals of each attack. You can see the current version here. http://www.w3.org/2006/WSC/wiki/ThreatTrees As discussed on the call earlier this week, much of XSS is beyond our scope. I would suggest, however, that 2.A.i, 2.A.iv, 2.B.i, and 2.B.iv, all of which involve the site sending information to a different site than the legitimate one being viewed, constitute information that a user agent *might* deem relevant to the user. The others branches are there for completeness but, operating exclusively within the site being viewed, likely represent security issues beyond our scope. Any comments are, of course, invited. And I hope Stuart doesn't object to my formatting changes. :) Cheers, Johnathan --- Johnathan Nightingale Human Shield johnath@mozilla.com
Received on Monday, 26 March 2007 17:39:07 UTC