<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: bill-zeller</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/bill-zeller.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2008-09-29T13:11:23+00:00</updated><author><name>Simon Willison</name></author><entry><title>Quoting Bill Zeller</title><link href="https://simonwillison.net/2008/Sep/29/popular/#atom-tag" rel="alternate"/><published>2008-09-29T13:11:23+00:00</published><updated>2008-09-29T13:11:23+00:00</updated><id>https://simonwillison.net/2008/Sep/29/popular/#atom-tag</id><summary type="html">
    &lt;blockquote cite="http://www.freedom-to-tinker.com/blog/wzeller/popular-websites-vulnerable-cross-site-request-forgery-attacks"&gt;&lt;p&gt;We've found CSRF vulnerabilities in sites that have a huge incentive to do security correctly. If you're in charge of a website and haven't specifically protected against CSRF, chances are you're vulnerable.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="http://www.freedom-to-tinker.com/blog/wzeller/popular-websites-vulnerable-cross-site-request-forgery-attacks"&gt;Bill Zeller&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bill-zeller"&gt;bill-zeller&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/csrf"&gt;csrf&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="bill-zeller"/><category term="csrf"/><category term="security"/></entry><entry><title>Popular Websites Vulnerable to Cross-Site Request Forgery Attacks</title><link href="https://simonwillison.net/2008/Sep/29/csrf/#atom-tag" rel="alternate"/><published>2008-09-29T13:08:52+00:00</published><updated>2008-09-29T13:08:52+00:00</updated><id>https://simonwillison.net/2008/Sep/29/csrf/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.freedom-to-tinker.com/blog/wzeller/popular-websites-vulnerable-cross-site-request-forgery-attacks"&gt;Popular Websites Vulnerable to Cross-Site Request Forgery Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Ed Felten and Bill Zeller announce four CSRF holes, in ING Direct, YouTube, MetaFilter and the New York Times. The ING Direct hole allowed transfer of funds out of a user’s bank accounts! The first three were fixed before publication; the New York Times hole still exists (despite being reported a year ago), and allows you to silently steal e-mail addresses by CSRFing the “E-mail this” feature.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bill-zeller"&gt;bill-zeller&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/csrf"&gt;csrf&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ed-felten"&gt;ed-felten&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ingdirect"&gt;ingdirect&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/metafilter"&gt;metafilter&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/new-york-times"&gt;new-york-times&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/youtube"&gt;youtube&lt;/a&gt;&lt;/p&gt;



</summary><category term="bill-zeller"/><category term="csrf"/><category term="ed-felten"/><category term="ingdirect"/><category term="metafilter"/><category term="new-york-times"/><category term="security"/><category term="youtube"/></entry></feed>