<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: jeremiah-grossman</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/jeremiah-grossman.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2008-11-03T12:43:34+00:00</updated><author><name>Simon Willison</name></author><entry><title>Quoting Jeremiah Grossman</title><link href="https://simonwillison.net/2008/Nov/3/jeremiah/#atom-tag" rel="alternate"/><published>2008-11-03T12:43:34+00:00</published><updated>2008-11-03T12:43:34+00:00</updated><id>https://simonwillison.net/2008/Nov/3/jeremiah/#atom-tag</id><summary type="html">
    &lt;blockquote cite="http://jeremiahgrossman.blogspot.com/2008/11/browser-security-bolt-it-on-then-build.html"&gt;&lt;p&gt;When visiting any Web page, the site owner is easily able to ascertain what websites you've visited (CSS color hacks) or places you're logged-in (JavaScript errors / IMG loading behavior). They can also automatically exploit your online bank, social network, and webmail accounts (XSS). Additionally, the browser could be instructed to hack devices on the intranet, including DSL routers and printers. And, if that's not enough, they could turn you into a felon by forcing requests to illegal content or hack other sites (CSRF).&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="http://jeremiahgrossman.blogspot.com/2008/11/browser-security-bolt-it-on-then-build.html"&gt;Jeremiah Grossman&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/csrf"&gt;csrf&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/jeremiah-grossman"&gt;jeremiah-grossman&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/xss"&gt;xss&lt;/a&gt;&lt;/p&gt;



</summary><category term="csrf"/><category term="jeremiah-grossman"/><category term="security"/><category term="xss"/></entry><entry><title>Crossdomain.xml Invites Cross-site Mayhem</title><link href="https://simonwillison.net/2008/May/15/jeremiah/#atom-tag" rel="alternate"/><published>2008-05-15T08:06:24+00:00</published><updated>2008-05-15T08:06:24+00:00</updated><id>https://simonwillison.net/2008/May/15/jeremiah/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://jeremiahgrossman.blogspot.com/2008/05/crossdomainxml-invites-cross-site.html"&gt;Crossdomain.xml Invites Cross-site Mayhem&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
A useful reminder that crossdomain.xml files should be treated with extreme caution. Allowing access from * makes it impossible to protect your site against CSRF attacks, and even allowing from a “circle of trust” of domains can be fatal if just one of those domains has an XSS hole.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/crossdomainxml"&gt;crossdomainxml&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/csrf"&gt;csrf&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/flash"&gt;flash&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/javascript"&gt;javascript&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/jeremiah-grossman"&gt;jeremiah-grossman&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/xss"&gt;xss&lt;/a&gt;&lt;/p&gt;



</summary><category term="crossdomainxml"/><category term="csrf"/><category term="flash"/><category term="javascript"/><category term="jeremiah-grossman"/><category term="security"/><category term="xss"/></entry><entry><title>CSRF presentation at RSA 2008</title><link href="https://simonwillison.net/2008/Apr/12/jeremiah/#atom-tag" rel="alternate"/><published>2008-04-12T10:52:46+00:00</published><updated>2008-04-12T10:52:46+00:00</updated><id>https://simonwillison.net/2008/Apr/12/jeremiah/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://jeremiahgrossman.blogspot.com/2008/04/csrf-presentation-at-rsa-2008.html"&gt;CSRF presentation at RSA 2008&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
It terrifies me how few people understand CSRF, years after it was discovered. I’ll say it again: if you’re a web developer and you don’t know what that acronym means, go spend an hour reading about it—because the chances are your applications are vulnerable.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/csrf"&gt;csrf&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/jeremiah-grossman"&gt;jeremiah-grossman&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/rsa"&gt;rsa&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/rsa2008"&gt;rsa2008&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="csrf"/><category term="jeremiah-grossman"/><category term="rsa"/><category term="rsa2008"/><category term="security"/></entry></feed>