Production (ã»ãã¥ãªãã£ç·¨)ã¨ãããã¨ã§çãã«ãªããã¡ãªã»ãã¥ãªãã£ã®è©±
kintoneã¯JavaScriptã使ã£ã¦èªç±ã«ã«ã¹ã¿ãã¤ãºã§ãã¾ãã ã«ã¹ã¿ãã¤ãºã«ããç¬èªã®ãªãããªUIãæ§ç¯ããããæ°ããæ©è½ã追å ãããã§ãã¾ãããã»ãã¥ã¢ãªã³ã¼ãã£ã³ã°ãããªã㨠ã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã° ï¼ä»¥ä¸ãXSSï¼ãªã©ã®èå¼±æ§ãä½ãè¾¼ãã§ãã¾ãå±éºæ§ãããã¾ãã ãã®è¨äºã§ã¯ãJavaScriptã§ã»ãã¥ã¢ãªã³ã¼ãã£ã³ã°ãããããã®åºæ¬çãªãã¤ã³ãã解説ãã¾ãã
Angularã¨ãµã¼ãã¼ãµã¤ããã³ãã¬ã¼ãã®æ··å¨ å æ¥ãªãªã¼ã¹ãããæãµã¼ãã¹(ä»ç¤¾)ãAngularã使ã£ã¦ãã¦ãXSSãããããåºã¦ããã ã¨ãã{{var}} ãªå½¢å¼ã§å¤ãå ¥åããã¨ng-templateå´ã§ãã³ãã¬ã¼ãã£ã³ã°ãããã ã¨ãã®è©±ãããã¾ããã 詳ããã¯è¦ã¦ããªãã®ã§ãä»åã®è©±ã¨ã¾ã£ããåããã¯ææ¡ãã¦ãã¾ãããããµã¼ãã¼ãµã¤ããã³ãã¬ã¼ããæ··å¨ãããã¨ã次ã®ãããªãã¨ãèµ·ãããã¾ãã ä¾ãã°ejsã¨Angular ãµã³ãã«ã¨ãã¦ã¹ã«ã¹ã«ãªControllerãç¨æãã¾ãã angular.module('app', []).controller('AcmeCtrl', function($scope) { $scope.foo = 'bar'; }); ejsã¯æ¬¡ã®ãããªãã³ãã¬ã¼ãã«ãªã£ã¦ããã¨ãã¾ãã
Object.prototype.__defineSetter__ã使ã£ãAndroidã§ã®JSON Hijackingã«é¢ã㦠ããªãã Shibuya.XSSã§å¾³ä¸¸ãããç´¹ä»ããã¦ãObject.prototype.__defineSetter__ã使ã£ãJSON Hijackingã«é¢ãã¦ãFx3ç³»ã¨Android 2ç³»ã§åä½ãããã¨ã®ãã¨ã ã£ãã®ã§æ¤è¨¼ãã¦ã¿ãã
Exploiting the Google Chrome Developer Tools Recently, there was a front page Hacker News post asking How does Facebook disable Developer Tools? which linked a Stack Overflow question here. With the first part of the vulnerabilities I discovered being widely availible online I figured now was a good of time as any to write a post the rest of them. On a quick note before I get into the post, I'm lo
ï¼ä¸ç¤¾*1ã®æ¥å課é¡ã ãµã¤ãã¦ãºã®ã½ãªã¥ã¼ã·ã§ã³ã§è§£æ±ºããã API ããã¥ã¡ã³ããè¨è¨ã»éçºã»éç¨ã®ãã¦ãã¦ããã¤ãã³ãæ å ±ãªã©ã ã¨ã³ã¸ãã¢ã®ææãæå¤§åããæè¡æ å ±ãçºä¿¡ãã¦ãã¾ãã *1 2025å¹´10ææç¹ã§ã®kintoneå°å ¥ç¤¾æ°
ã¯ã¦ãªã°ã«ã¼ãã®çµäºæ¥ã2020å¹´1æ31æ¥(é)ã«æ±ºå®ãã¾ãã 以ä¸ã®ã¨ã³ããªã®éããä»å¹´æ«ãç®å¦ã«ã¯ã¦ãªã°ã«ã¼ããçµäºäºå®ã§ããæ¨ããç¥ãããã¦ããã¾ããã 2019å¹´æ«ãç®å¦ã«ãã¯ã¦ãªã°ã«ã¼ãã®æä¾ãçµäºããäºå®ã§ã - ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ ãã®ãã³ãæ£å¼ã«çµäºæ¥ã決å®ãããã¾ããã®ã§ã以ä¸ã®éãã確èªãã ããã çµäºæ¥: 2020å¹´1æ31æ¥(é) ã¨ã¯ã¹ãã¼ã叿ç³è«æé:2020å¹´1æ31æ¥(é) çµäºæ¥ä»¥éã¯ãã¯ã¦ãªã°ã«ã¼ãã®é²è¦§ããã³æç¨¿ã¯è¡ãã¾ãããæ¥è¨ã®ã¨ã¯ã¹ãã¼ããå¿ è¦ãªæ¹ã¯ä»¥ä¸ã®è¨äºã«ãããã£ã¦æç¶ãããã¦ãã ããã ã¯ã¦ãªã°ã«ã¼ãã«æç¨¿ãããæ¥è¨ãã¼ã¿ã®ã¨ã¯ã¹ãã¼ãã«ã¤ã㦠- ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ ãå©ç¨ã®ã¿ãªãã¾ã«ã¯ãè¿·æãããããããã¾ãããã©ãããããããé¡ããããã¾ãã 2020-06-25 è¿½è¨ ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ã®ã¨ã¯ã¹ãã¼ããã¼ã¿ã¯2020å¹´2æ28
ã¯ã¦ãªã°ã«ã¼ãã®çµäºæ¥ã2020å¹´1æ31æ¥(é)ã«æ±ºå®ãã¾ãã 以ä¸ã®ã¨ã³ããªã®éããä»å¹´æ«ãç®å¦ã«ã¯ã¦ãªã°ã«ã¼ããçµäºäºå®ã§ããæ¨ããç¥ãããã¦ããã¾ããã 2019å¹´æ«ãç®å¦ã«ãã¯ã¦ãªã°ã«ã¼ãã®æä¾ãçµäºããäºå®ã§ã - ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ ãã®ãã³ãæ£å¼ã«çµäºæ¥ã決å®ãããã¾ããã®ã§ã以ä¸ã®éãã確èªãã ããã çµäºæ¥: 2020å¹´1æ31æ¥(é) ã¨ã¯ã¹ãã¼ã叿ç³è«æé:2020å¹´1æ31æ¥(é) çµäºæ¥ä»¥éã¯ãã¯ã¦ãªã°ã«ã¼ãã®é²è¦§ããã³æç¨¿ã¯è¡ãã¾ãããæ¥è¨ã®ã¨ã¯ã¹ãã¼ããå¿ è¦ãªæ¹ã¯ä»¥ä¸ã®è¨äºã«ãããã£ã¦æç¶ãããã¦ãã ããã ã¯ã¦ãªã°ã«ã¼ãã«æç¨¿ãããæ¥è¨ãã¼ã¿ã®ã¨ã¯ã¹ãã¼ãã«ã¤ã㦠- ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ ãå©ç¨ã®ã¿ãªãã¾ã«ã¯ãè¿·æãããããããã¾ãããã©ãããããããé¡ããããã¾ãã 2020-06-25 è¿½è¨ ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ã®ã¨ã¯ã¹ãã¼ããã¼ã¿ã¯2020å¹´2æ28
åç´ã§ã¯ãªããææ°ãã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã°ãäºæ ï¼HTML5æä»£ã®ãæ°ããã»ãã¥ãªãã£ã»ã¨ãã±ãããï¼2ï¼ï¼1/3 ãã¼ã¸ï¼ é£è¼ç®æ¬¡ çããããã«ã¡ã¯ããããã¨ã¼ã¸ã§ã³ãã®ã¯ãããããããã§ãã第1åç®ã¯ãWebã¢ããªã±ã¼ã·ã§ã³ã»ãã¥ãªãã£ã®å¢çæ¡ä»¶ã§ãããªãªã¸ã³ã¨ããæ¦å¿µã«ã¤ãã¦èª¬æãã¾ããã ç¾å¨ã®Webãã©ã¦ã¶ã¼ã§ã¯ãåä¸ãªãªã¸ã³ã®ãªã½ã¼ã¹ã¯åãä¿è·ç¯å²ã«ãããã®ã¨ãããªãªã¸ã³ãè¶ ããã¢ã¯ã»ã¹ã«ã¤ãã¦ã¯ãªã½ã¼ã¹ã®æä¾å ãæç¤ºçã«è¨±å¯ããªãéãã¯ã¢ã¯ã»ã¹ã§ããªãã¨ããããåä¸ãªãªã¸ã³ããªã·ã¼ï¼Same-Origin Policyï¼ãã«å¾ã£ã¦ãªã½ã¼ã¹ãä¿è·ãã¦ãã¾ãã ãã®ä¿è·ç¯å²ã§ãããªãªã¸ã³ãè¶ ãããªã½ã¼ã¹ã«ã¢ã¯ã»ã¹ããæ»æã®ä»£è¡¨äºä¾ã§ããã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã°ï¼XSSï¼ã«ã¤ãã¦ãä»åãããã³æ¬¡åã®2åã«åããHTML5ã«ããã¦ããé«åº¦åãããæ»æã¨ããã®å¯¾çã説æãã¾
å æ¥ã®ng-mtg#4 AngularJS åå¼·ä¼ã§LTãããã¨æã£ããã©ç³ãè¾¼ã¿ãéã«åããªãã£ãã®ã§ããã°ã«æ¸ãã¾ãã å æãªãªã¼ã¹ãããAngularJS 1.2ã¯ã»ãã¥ãªãã£ããã°ã£ã¦ãçãªãã¨ãèããã®ã§ãã»ãã¥ãªãã£å¨ãã®ä»çµã¿ã調ã¹ã¦ã¿ã¾ããã ãé¡ã¯ä»¥ä¸ã§ãã CSRF JSON CSP (Content Security Policy) Escaping CSRF ã¦ãã¼ã¯ãªãã¼ã¯ã³ãHTTPãªã¯ã¨ã¹ãã«è¼ãã¦ãµã¼ãã¼ã§ãã§ãã¯ãã対å¿ãä¸ã®ä¸ã§ã¯ä¸»æµï¼æè¿ã¯ã«ã¹ã¿ã ãããã®ãã§ãã¯ã«ãã対çãï¼ AngularJSã§ã¯ãXSRF-TOKEN Cookieã«ãã¼ã¯ã³ãè¼ã£ã¦ããã¨ã$httpã使ã£ãHTTPãªã¯ã¨ã¹ãã®ãããã«èªåçã«X-XSRF-TOKENãããã¼ãä»ãã XSRF-TOKEN Cookieã¯ãã¡ããNot HttpOnlyã§ã Angularçã§ã¯CS
ããã¤ãã®ãµã¤ãã§å®éã«ééãã¦ã¾ããï¼jQueyr 1.6.3 ã§è§£æ±º( jQuery Bug #9521 )ããã¯ãã® $("a[href=" + hash + "]") ã¿ã¤ãã® XSS ã ï¼ 2013/11/18 ç¾å¨ 1.2.1 ãå«ãå ¨ã¦ã®ï¼ jQuery Migrate Plugin ã§å¾©æ´»ãã¾ãï¼ jQuery 1.6.3 ã®ã¿ã®å ´å jQuery 1.10.2 㨠Migrate Plugin 1.2.1 ã®å ´å è²ã 追ã£ã¦ã¿ã¦ï¼ãã£ã±ãã¾ã åããã©ã¨è¨ã£ããï¼8æã«ãã§ã«ï¼å®éãã°ã ãã©ããã§æ³å®éããªãã ã¨è¨ããã¦ãï¼He told me that this was not, in fact, a bug, but was working as intended.ï¼ ã®ã§ãããããã¨ã ã£ãã¿ããã§ãï¼ jQuery æ¬ä½å´ã®å¤é· jQuery ã® $() ã«ã¯è¤æ°ã®
You can find (just about) anything on Medium â apparently even a page that doesnât exist. Maybe these stories will take you somewhere new?
ã¯ã¦ãªã°ã«ã¼ãã®çµäºæ¥ã2020å¹´1æ31æ¥(é)ã«æ±ºå®ãã¾ãã 以ä¸ã®ã¨ã³ããªã®éããä»å¹´æ«ãç®å¦ã«ã¯ã¦ãªã°ã«ã¼ããçµäºäºå®ã§ããæ¨ããç¥ãããã¦ããã¾ããã 2019å¹´æ«ãç®å¦ã«ãã¯ã¦ãªã°ã«ã¼ãã®æä¾ãçµäºããäºå®ã§ã - ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ ãã®ãã³ãæ£å¼ã«çµäºæ¥ã決å®ãããã¾ããã®ã§ã以ä¸ã®éãã確èªãã ããã çµäºæ¥: 2020å¹´1æ31æ¥(é) ã¨ã¯ã¹ãã¼ã叿ç³è«æé:2020å¹´1æ31æ¥(é) çµäºæ¥ä»¥éã¯ãã¯ã¦ãªã°ã«ã¼ãã®é²è¦§ããã³æç¨¿ã¯è¡ãã¾ãããæ¥è¨ã®ã¨ã¯ã¹ãã¼ããå¿ è¦ãªæ¹ã¯ä»¥ä¸ã®è¨äºã«ãããã£ã¦æç¶ãããã¦ãã ããã ã¯ã¦ãªã°ã«ã¼ãã«æç¨¿ãããæ¥è¨ãã¼ã¿ã®ã¨ã¯ã¹ãã¼ãã«ã¤ã㦠- ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ ãå©ç¨ã®ã¿ãªãã¾ã«ã¯ãè¿·æãããããããã¾ãããã©ãããããããé¡ããããã¾ãã 2020-06-25 è¿½è¨ ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ã®ã¨ã¯ã¹ãã¼ããã¼ã¿ã¯2020å¹´2æ28
Der Vortrag über JavaScript-Sicherheit beschreibt die Risiken von Cross-Site-Scripting (XSS) und die weitreichenden Angriffsflächen, die durch die universelle Nutzung von JavaScript entstehen. Es werden verschiedene Typen von XSS, Methoden zur Risikominderung und die Herausforderungen von modernen JavaScript-Bibliotheken und Single-Page-Anwendungen thematisiert. Zudem wird aufgezeigt, dass einfach
ã¯ã¦ãªã°ã«ã¼ãã®çµäºæ¥ã2020å¹´1æ31æ¥(é)ã«æ±ºå®ãã¾ãã 以ä¸ã®ã¨ã³ããªã®éããä»å¹´æ«ãç®å¦ã«ã¯ã¦ãªã°ã«ã¼ããçµäºäºå®ã§ããæ¨ããç¥ãããã¦ããã¾ããã 2019å¹´æ«ãç®å¦ã«ãã¯ã¦ãªã°ã«ã¼ãã®æä¾ãçµäºããäºå®ã§ã - ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ ãã®ãã³ãæ£å¼ã«çµäºæ¥ã決å®ãããã¾ããã®ã§ã以ä¸ã®éãã確èªãã ããã çµäºæ¥: 2020å¹´1æ31æ¥(é) ã¨ã¯ã¹ãã¼ã叿ç³è«æé:2020å¹´1æ31æ¥(é) çµäºæ¥ä»¥éã¯ãã¯ã¦ãªã°ã«ã¼ãã®é²è¦§ããã³æç¨¿ã¯è¡ãã¾ãããæ¥è¨ã®ã¨ã¯ã¹ãã¼ããå¿ è¦ãªæ¹ã¯ä»¥ä¸ã®è¨äºã«ãããã£ã¦æç¶ãããã¦ãã ããã ã¯ã¦ãªã°ã«ã¼ãã«æç¨¿ãããæ¥è¨ãã¼ã¿ã®ã¨ã¯ã¹ãã¼ãã«ã¤ã㦠- ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ ãå©ç¨ã®ã¿ãªãã¾ã«ã¯ãè¿·æãããããããã¾ãããã©ãããããããé¡ããããã¾ãã 2020-06-25 è¿½è¨ ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ã®ã¨ã¯ã¹ãã¼ããã¼ã¿ã¯2020å¹´2æ28
ECMAScriptã®ä»æ§ã§ã¯ã0x0A/0x0D以å¤ã«U+2028/2029ã®æåãæ¹è¡ã¨ãããã¨ãæè¨ããã¦ãã¾ãã ããã¯ãã¾ãç¥ããã¦ããªãããã«æãã¾ãã 以ä¸ã¯ã¢ã©ã¼ããåºãã¾ãã <script> //[U+2028]alert(1) </script> ç¥ããã¦ããªãã ãã§ãªããç¥ã£ã¦ããã¨ãã¦ããã¹ã¯ãªããã§æååãå¦çããã¨ãã«ãU+2028/2029ã¾ã§èæ ®ããéçºè ãã©ãã ãããã®ãã¨ãã話ã§ãã å®éãU+2028/2029ãæ¾ãè¾¼ãã¨æååãªãã©ã«å ã«ãã®æåãçã®ã¾ã¾é ç½®ãããã¨ã©ã¼ãåºããã¼ã¸ã¯æ¬å½ã«ããããããã¾ããã¾ããã¨ã©ã¼ãã§ãã ããªãã大æµã®å ´å大ããªåé¡ã«ã¯ãªãã¾ããã ã¨ããããU+2028/2029ã«ãã£ã¦XSSãå¼ãèµ·ãããã¦ãã¾ãå ´åã¨ããã®ãæè¿å®éã«è¦ã¾ããã Googleã®ãµã¼ãã¹ã§è¦ã¤ãã2ã¤ã®ã±ã¼ã¹ãåãä¸ãããã¨æãã¾ãã ã±
We, like an overwhelming majority of the Internet, use jQuery on the Box web application. We use it primarily to make our lives easier as it effectively abstracts away cross-browser API differences. The plugin infrastructure makes it easy to extend and fill in any gaps we may have. For all that jQuery offers, though, there is one downside: jQuery makes XSS easier than if you use native methods. Th
ã¯ãããããããæ°ã®ããã°ã¨ã³ããªãæ©å¯æ å ±ãå«ãJSONã«ã¯ X-Content-Type-Options: nosniff ãã¤ããã¹ããã«ã¦ãå·§å¦ãªç½ ã仿ãããã¨ã«ãããå¥ãã¡ã¤ã³ã®JSONãã¼ã¿ãvbscriptã¨ãã¦èªã¿è¾¼ã¿ãã¨ã©ã¼ãã³ãã©çµç±ã§æ©å¯æ å ±ãçã¿åºãã¨ããææ³ãç´¹ä»ããã¾ãããããã¯ãIEã®èå¼±æ§CVE-2013-1297ãæªç¨ãããã®ã§ãMS13-037ã«ã¦è§£æ¶ããã¦ãã¾ãããMS13-037ã¯IE6ï½IE8ã対象ã§ãããIE9以éã§ã¯è§£æ¶ããã¦ãã¾ããã ã¾ããMS13-037ãé©ç¨ãã¦ããªãIE6ï½IE8ã®å©ç¨è ããã°ããæ®ãã¨èãããããã¨ããããã®åé¡ã詳ãã説æè´ãã¾ãããµã¤ãå´ã®å¯¾çã®åèã«ãã¦ä¸ããã åé¡ã®æ¦è¦ JSONå½¢å¼ã®ãã¼ã¿ã¯ãé常ã¯XMLHttpRequestãªãã¸ã§ã¯ãã«ããèªã¿åºãã¾ãããæ»æè ãç½ ãµã¤ãã使ãã¦ãvbscript
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ã¡ã³ããã³ã¹
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}