lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 15 Mar 2007 13:42:12 -0400
From: <>
To: <>, <>
Subject: Re: - Local Clipboard

If they can write to it, then they can read from it. There is no distinction or security control.

There will also not be a trace on the client side that anything has happened. Additonal testing with Opera and FF2 show that they do not block/prompt for this behaviour by default. So you can't make the statement that nothing happend with FF.


----- Original Message -----
From: Shaun []
Sent: Thu, 15 Mar 2007 12:30:48 -0500
Subject: Re: [Full-disclosure] - Local Clipboard

I took a quick look and it appears that they aren't trying to read the
clipboard, they're trying to write the generated tinyurl to it for the
folks who are too lazy to control-c it out of the page. Annoying to have
your clipboard contents clobbered, but not really a threat.

It didn't do anything in FF2.


On Thu, 15 Mar 2007 10:15:53 -0400
<> wrote:

> " 
> Making long URLs usable! More than 29 million of them. Over 700 million hits/month."
> Word of warning. When you submit a url to be shortened by they attempt to steal the contents of your local clipboard.
> IE7 intercepts this and ask whether you want a site to be able to access your clipboard or not. Not sure how IE6, Opera and Firefox behave.
> Sent an email to inquire about why they were trying to access. No response as of yet.
> Jay

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists