<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: applets</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/applets.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2009-05-19T19:07:56+00:00</updated><author><name>Simon Willison</name></author><entry><title>Critical Mac OS X Java Vulnerabilities</title><link href="https://simonwillison.net/2009/May/19/critical/#atom-tag" rel="alternate"/><published>2009-05-19T19:07:56+00:00</published><updated>2009-05-19T19:07:56+00:00</updated><id>https://simonwillison.net/2009/May/19/critical/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://landonf.bikemonkey.org/code/macosx/CVE-2008-5353.20090519.html"&gt;Critical Mac OS X Java Vulnerabilities&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
There’s a five month old Java arbitrary code execution vulnerability which hasn’t yet been patched by Apple. Disable Java applets in your browser until it’s fixed, or random web pages could execute commands on your machine as your user account.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/apple"&gt;apple&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/applets"&gt;applets&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/browsers"&gt;browsers&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/java"&gt;java&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/macos"&gt;macos&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="apple"/><category term="applets"/><category term="browsers"/><category term="java"/><category term="macos"/><category term="security"/></entry><entry><title>Evil GIFs: Partial Same Origin Bypass with Hybrid Files</title><link href="https://simonwillison.net/2008/Jul/1/evil/#atom-tag" rel="alternate"/><published>2008-07-01T08:58:45+00:00</published><updated>2008-07-01T08:58:45+00:00</updated><id>https://simonwillison.net/2008/Jul/1/evil/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://radar.oreilly.com/archives/2008/06/partial-same-origin-bypass-wit.html"&gt;Evil GIFs: Partial Same Origin Bypass with Hybrid Files&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
First there were PNGs that had crossdomain.xml files embedded in them, now there are GIFs that contain Java applets (as JAR files). At this point I’d say don’t even bother trying to validate uploaded files, just make sure they’re served off an entirely different domain instead where XSS doesn’t matter.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/applets"&gt;applets&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/crossdomainxml"&gt;crossdomainxml&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/gifs"&gt;gifs&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/javaapplets"&gt;javaapplets&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/pngs"&gt;pngs&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/uploads"&gt;uploads&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/validation"&gt;validation&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/xss"&gt;xss&lt;/a&gt;&lt;/p&gt;



</summary><category term="applets"/><category term="crossdomainxml"/><category term="gifs"/><category term="javaapplets"/><category term="pngs"/><category term="security"/><category term="uploads"/><category term="validation"/><category term="xss"/></entry></feed>