IEã®expressionã¨url â Internet Explorer ã§ã¯ãã¹ã¿ã¤ã«ã·ã¼ãä¸ã« expression(JavaScript?ã®æ) ã background:url(JavaScript?ã®æ) ã¨ããè¨æ³ãè¡ããã¨ã§ããããã¤ãããã¯ãªHTMLããã¥ã¡ã³ããä½æãããã¨ãå¯è½ã§ãã <style>input { left:expression( alert('expression!') ) }</style> <style>div { background:url(alert('URL!') ) }</style> ãã¡ãããã¤ã³ã©ã¤ã³ã§è¨è¿°ãããã¨ãã§ãã¾ãã <div style="{ left:expression( alert('expression!') ) }"> <div style="{ background:url( alert('URL!') )
XSSã«CSRFã«SQLã¤ã³ã¸ã§ã¯ã·ã§ã³ã«ãã£ã¬ã¯ããªãã©ãã¼ãµã«â¦â¦Webã¢ããªã±ã¼ã·ã§ã³ã®ããã°ã©ããç¥ã£ã¦ããã¹ãèå¼±æ§ã¯ãã£ã±ãããã¾ããããã§æ¬é£è¼ã§ã¯ããã®ãããªã¡ã¸ã£ã¼ãªãã®â以å¤âãæãä¸ãã¦ããã¾ãï¼ç·¨éé¨ï¼ å°ããªè©±é¡ãé¢ç½ã çãããã¯ããã¾ãã¦ãã¯ãããããããã¨ç³ãã¾ãã ãæç§æ¸ã«è¼ããªãWebã¢ããªã±ã¼ã·ã§ã³ã»ãã¥ãªãã£ãã¨ãããã¨ã§ãWebã¢ããªã±ã¼ã·ã§ã³ã®ã»ãã¥ãªãã£ã«é¢é£ãããæ®æ®µãã¾ãè¦æããªããããªå°ããªè©±é¡ãåãä¸ãã¦ããããã¨æãã¾ãã ã»ãã¥ã¢ãªWebã¢ããªã±ã¼ã·ã§ã³ãå®ç¾ããããã«ãéçºè ã®æ¹ã ãã§ãªããWebã¢ããªã±ã¼ã·ã§ã³ã®èå¼±æ§æ¤æ»ãè¡ãæ¹ã ã«ãèªãã§ããã ãããã¨æã£ã¦ãã¾ããéç®±ã®é ãæ¥æã§ã»ããããããªå°ããªè©±é¡ã°ããã§ãããçãããããããé¡ããã¾ãã ãã¦ç¬¬1åã¯ãInternet ExplorerãHTMLã解éããéã®å¼ç¨
ãããã¿ããªï¼å æ°ï¼ã¨ãã¾ãã²ããã§ããä»æ¥ã¯Session Fixationæ»æã®æ¹æ³ããã£ããæãã¡ãããã ãã¤ãã¯é²å¾¡å´ã§æ¼¢åã®ååã§ãã£ã¦ããã ãã©ï¼ãããã¯æ»æå´ã¨ãããã¨ã§ï¼åä¹ããã²ãããªã«å¤ãããã ãã ã£ã¦ãï¼ä»åº¦ãããµãã§ãä¸ç·ããã¯ãããããããããã¨ãï¼ã¯ã¾ã¡ã¡ããã¨ãï¼ã²ãããªã®äººãã¡ã®æ¹ãæ ¼å¥½è¯ããããããªããã ã§ã¯å§ãããã ãã®ã¨ã³ããªã¯ãhttp://blog.tokumaru.org/2009/01/introduction-to-session-fixation-attack.html ã«ç§»è»¢ãã¾ãããæãå ¥ãã¾ãããç¶ãã¯ããã¡ããã覧ãã ããã
è£è¶³ ãã®è¨äºã¯æ§å¾³ä¸¸æµ©ã®æ¥è¨ããã®è»¢è¼ã§ãï¼å URLãã¢ã¼ã«ã¤ããã¯ã¦ãªããã¯ãã¼ã¯1ãã¯ã¦ãªããã¯ãã¼ã¯2ï¼ã åå¿ã®ãã転è¼ãããã¾ããããã®è¨äºã¯2008å¹´12æ22æ¥ã«å ¬éããããã®ã§ãå½æã®å¾³ä¸¸ã®èãã示ããã®ããåºæ¬çã«å 容ãå¤æ´ããã«ãã®ã¾ã¾è»¢è¼ãããã®ã§ãã è£è¶³çµãã ä»å¹´ã®Black Hat Japanã«ã¯ãã¯ãããããããæ°ãã趣å³ã¨å®çã®æåã³ã¼ãæ»æãã¨é¡ãã¦è¬æ¼ãã話é¡ã¨ãªã£ãããã®è¬æ¼è³æãå ¬éããã¦ããã®ã§ãç§ã¯è¬æ¼ã¯èãéããããè³æã¯èå³æ·±ãæè¦ããããã®è¬æ¼è³æã®P20以éã«ã¯ããå¤å¯¾ä¸ã®å¤æãã¨é¡ãã¦ãUnicodeã®U+00A5ï¼é貨è¨å·ã¨ãã¦ã®ï¿¥ï¼ããä»ã®æåã³ã¼ãã«å¤æãããéã«ããã¯ã¹ã©ãã·ã¥ã\ãï¼æ¥æ¬èªç°å¢ã§ã¯é貨è¨å·ï¼ã®0x5Cã«å¤æããããã¨ããããã¹ãã©ãã¼ãµã«ãçºçããä¾ãç´¹ä»ããã¦ããã ããããããã¯ã¹ã©ãã·ã¥ã¨è¨ãã°SQL
PHPã§éçºããããã¨ãå¤ããªãPerlã®è¯ããå確èªãã¦ããä»æ¥ãã®é ã§ããçããããããéããã§ããããã ãã¦ãä»æ¥ã¯ä»ãã£ã¨ããã¦ãPHPã®Webã¢ããªã±ã¼ã·ã§ã³ãã¬ã¼ã ã¯ã¼ã¯ã§ããCakePHPã®ã話ãä¸ã¤ã CakePHPã«ã¯çµã¿è¾¼ã¿ã³ã³ãã¼ãã³ãã¨ãã¦ãªã¯ã¨ã¹ããã³ãã©(RequestHandler)ãåãã£ã¦ãã¾ãã ãªã¯ã¨ã¹ããã³ããªã³ã° :: çµã¿è¾¼ã¿ã®ã³ã³ãã¼ãã³ã :: ããã¥ã¢ã« :: 1.2 Collection :: The Cookbook: ãã®RequestHandlerã®ã¡ã½ããã§ããgetClientIPãå°å¦çã«ã¯å±éºããã ã¨ããã話ã(ãããã®ã¨ã³ããªã®ã¿ã¤ãã«éï½) ã¾ãã¯getClientIPã®å®è£ ã³ã¼ããã(1.2ãä¾ã«ã¨ã£ã¦ããã1.1ãã»ã¼ä¸ç·ã§ãã) https://trac.cakephp.org/browser/trunk/c
-Keynote- Black Ops of DNS 2008 : Its The End Of The Cache As We Know It -åºèª¿è¬æ¼- DNS 2008çãBlack Ops. ä»ã¾ã§ã®DNSãã£ãã·ã¥ããéããªãï¼ by Dan Kaminsky ï¼ãã³ã»ã«ãã³ã¹ãã¼ï¼ Presentation Slides New reverse engineering technique using API hooking and sysenter hooking, and capturing of cash card access APIããã¯ã¨sysenterããã¯ãå©ç¨ããæ°ãã解æãã¯ããã¯ã¨ããã£ãã·ã¥ã«ã¼ãã¢ã¯ã»ã¹ã®ãã£ããã£ãªã³ã° by Kenji Aiko Presentation Slides (ENGLISH) Presentation Slides (J
ãKAGOME æ¤ç©æ§ä¹³é ¸èã©ãã¬ãã¯ããããã ä¹³é ¸èã®æã¤äººä½ã¸ã®å¹æã«ã¤ãã¦ã¯ ããããæè¦ãããã¨ã¯æãããç§ã®å¨å²ã§ã¯ 便èãã»ã¨ãã©ãªããªã£ã ã¨ãã声ãããèãããã ï¼ãããã« ç§ã ããã¯å®æããï¼ ãã ãã¡ãã£ã¨å¤æ®µãé«ããã ããï¼KAGOME æ¤ç©æ§ä¹³é ¸èã©ã㬠130mlå ¥ã㧠¥110ãï¿¥120ãããããã ãªãã¨ã ãªããããããªã¼ã»ã»ã»ã¨è¦ã¦ããã çèï¼ ãããããã²ãã£ã¨ããã ãªãã¨ããªããããã¼ï¼ â èª²é¡ ä¹³é ¸èã¨ããããã«ã¯ ã¨ã¼ã°ã«ãã§ãããã¾ã ãKAGOME æ¤ç©æ§ä¹³é ¸èã©ãã¬ãã¨ãããã¼ãã³ã°ã¯ããªããªã ããã¨æãããã¡ãã£ã¨ ã¢ã³ãã§ã¢ ãªæ°ãããã ä¹³é ¸èã¯ã©ãã«ã§ãããã®ã§ãæ¡åãããå ´æã§ãã¼ãã³ã°ãããããã ãããæ¤ç©æ§ä¹³é ¸èãã ãã§ãªããè ¸ç®¡æ§ä¹³é ¸èããåå£ä¹³é ¸èããããããã å ´æã§ååãã¤ãã¦ãã ããããªãã ãé½ä¼æ§äºº
é ãã°ããªããIE8β2ã®Anti-XSSæ©è½ï¼ã®ä¸é¨ï¼ã§ãããXSS Filterã¨toStaticHTMLã触ã£ã¦ã¿ã¾ããããã®æ触ãå°ãæ¸ãã¦ã¿ã¾ãã XSS Filter ä¸è¬è«ã¨ãã¦ãXSSã®æ»æã対çæ¹æ³ã¯ããã©ã¡ã¼ã¿ã®å¤ãHTMLã®ã©ã®é¨åã«åºåããããã«ãã£ã¦ç°ãªãã¾ãã â ã¿ã°ã®å å´ï¼Element Contentï¼ ä¾ï¼<p>ãã</p> â¡ é常ã®å±æ§å¤å ï¼ã¯ã©ã¼ãä»ãï¼ ä¾ï¼<input type="text" name="foo" value="ãã"> ⢠JavaScriptã®æååãªãã©ã«å ä¾ï¼<script>var x='ãã';</script> ⣠URIå±æ§å¤å ä¾ï¼<a href="ãã"> ä¸è¨ä»¥å¤ã®ãã¿ã¼ã³ãããã¾ãããå®éã®Webã¢ããªã§å¤ãè¦ãããã®ã¯ä¸ã®ãããªãã¿ã¼ã³ã§ã¯ãªããã¨æãã¾ãã ã¡ãã£ã¨è§¦ã£ã¦ã¿ãæãã§ããã¨ãXSS Fi
Cookie session security and open-source - Ruby on Rails: Core | Google ã°ã«ã¼ã Ralisã®ã»ãã·ã§ã³ç®¡çã®æ±æãã§ãã¯ã«ä½¿ãããsecret_keyãããªã¼ãã³ã½ã¼ã¹ã®Railsã¢ããªã±ã¼ã·ã§ã³ã«ã¨ã£ã¦ã¯èå¼±æ§ã«ãªãã®ã§ã¯ãªãããã¨ãã話ã ããã¯ç¢ºãã«ããã§ããªã¼ãã³ã½ã¼ã¹ã®Ralisã¢ããªã±ã¼ã·ã§ã³ãèªåã®ãµã¼ãã¼ã§ç¨¼åãããæã«ã¯ãconfig/environment.rb ã® config.action_controller.session = { :session_key => '_myproj_session', :secret => 'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx' } ã¨ãªã£ã¦ããé¨åã® :secret ã®é¨åï¼ä¸ã®ä¾ã§ã¯ 'xxxxxxx'
é¡åã®éãã§ããããã¾ã£ã¡ãï¼ï¼ï¼åå¼·ä¼ãã«åå ãã¦ãã¾ãããå ´æã¯äº¬æ¥è²ç°ãã°ã®PiOã§ãã ããã¯ããã¾ã£ã¡ãï¼ï¼ï¼åå¼·ä¼ãã¨ããã»ãã¥ãªãã£ã®åå¼·ä¼ã大éªã§å®æéå¬ããã¦ãããã§ããããããæ±äº¬ã«é²åºãã¦ãããã®ã§ããæåã«åå è ã®èªå·±ç´¹ä»ã¿ã¤ã ããã£ããã§ãããèãã¦ããã¨ããã¾ã¾ã§å§çºã§å¤§éªã«è¡ã£ã¦ãã®ãæ±äº¬ã§éå¬ãã¦ãããã¨å©ãããã¿ãããªäººãä½äººããã¦ãç±å¿ãªäººããããããããªããã¨æãã¾ããã åå¼·ä¼æ¬ä½ã¯13:00ããã ã£ããã§ãããæ10:30ããLTã®æ ããã£ã¦ããXSSèå¼±æ§ã«å¯¾ãXHRãç¨ããæ»æãã¨ããé¡åã§åã15åã»ã©åãã¾ãããå 容ã¨ãã¦ã¯ãXSSã«å¯¾ãã¦XHRã使ãã°å¤¢ãåºãããããã¨ãããã¨ã§ãããã¾ãä»ã®äººã主張ãã¦ãã®ãè¦ãäºãç¡ãã®ã§æ°ãã¿ãããããªããã©ãã¨ããããã»ãã¥ãªãã£çéã®äººã«æ¬ã£ã¦ããããã¨æã£ã¦åã£ã¦ã¿ã¾ããã è³æ: http:
is a totally awesome idea still being worked on. Check back later.
Another Ebay permanent XSSWritten by KFTuesday, 13 November 2012 The Indian security researcher Shubham Upadhyay aka Cyb3R_Shubh4M, sent us a new permanent XSS affecting the products listings on Ebay.com read more... F-Secure, McAfee and Symantec websites again XSSedWritten by DPFriday, 13 January 2012 Once again, the websites of the three famous antivirus vendors are vulnerable to cross-site scri
https://bugzilla.mozilla.org/attachment.cgi?id=327530 via https://bugzilla.mozilla.org/show_bug.cgi?id=230214 ã¢ãããã¼ãæ©è½ãæã¤Wikiãæ²ç¤ºæ¿ãªã©ã¯ã¢ãããã¼ãããããã¡ã¤ã«ã§*/xmlã*/xml+*ãè¿ããªãããã«ãã¾ãããã¨ãã話ã#ã¾ãXSSã ããªããã£ã¨çãã³ã¼ãã§ååã ãâ¦ã ãã£ã¨ç°¡æ½ã«è¨ãã°SVGï½µï¾ï¾ï¼¼(^o^)ï¼ IE6ã§ãXMLã§XSSå¯è½ã¨ã®ãã¨ã ããæ°ãã¤ããã¹ããªã®ã«æ°ã«ãã¦ããªãæãå¤ãæ°ãããã ä»åãã¦ãpf-xãè½ã¡ã¦ãã®ã§ã¢ãããã«ä¸ãã¦ã¿ããããè¦äºã http://f25.aaa.livedoor.jp/~lion/up/img/046.svg >< ><
â¦ããããªãã©ã¦ã¶ã§å¤ãªç¾è±¡ãèµ·ããã®ã§åãã注ç®ãã¦ããã®ã§ãããã¾ããIEã§å¤é¨ãã¡ã¤ã³ã®cookieãåãã¦ãã¾ãã¨ã¯â¦èª¿æ»ã®æ·±ãã足ããªãã£ããªãï¼ä¿º locationã§ãã¼ã¸é·ç§»ããããã·ã£ã¨å¦çãã¶ã£ãåã£ã¦ã»ããããï¼è«¸ãã©ã¦ã¶ ããã¨ããªãã§ããããã©ããªã«ããããããã¢ããããç³»ã¨ä½µãã¦ããããããããã¨å¤ãªç«¶åãèµ·ããããã模æ§ãã¨ããã®ãä»ã¾ã§ã®ç§ã®è¦è§£ã ä¸çªç¬ã£ãã®ããAãã¼ã¸ã§ï¼¢ãã¼ã¸ã¸ã®ãªã³ã¯ãè¸ãã å¾ï¼¢ãã¼ã¸ã表示å¾ãAãã¼ã¸ã¸æ»ãã¾ããï¼ã¨ããé¸æè¢ï¼ï¼¡ãã¼ã¸å ã®ã¹ã¯ãªããï¼ãåºããããã¨ãå¯è½ã¨ããåã¥ãã¦ãã¡ãã£ã¨è¦ããã¹ã°ã«æ»ã£ã¦ãã¦ããªã³ã¯ãã§ãcookieã¯åã£ã¦ãããªãã£ããã ããããã³ã¬ã ãããã¤æ³¢ã®å ¬å¼ãå®é¨çäºå®ã¨ã¿ãªããå¤å ¸çãªå®æ³¢åé¢æ°ãããããã¦ãè¤ç´ æ³¢åã§ããã¨æ±ºãä»ãã¦ãæºããã¹ãæ³¢åæ¹ç¨å¼ãæ±ããã¨ã·ã¥ã¬ã¼ãã£ã³ã¬ã¼æ¹ç¨å¼ã
ãã®ãã¼ã¸ã«ã¤ãã¦ã®èª¬æã»æ³¨æãªã© PHP ã¯ãApache ã¢ã¸ã¥ã¼ã«ããCGIãã³ãã³ãã©ã¤ã³ã¨ãã¦ä½¿ç¨ã§ããã¹ã¯ãªããè¨èªã§ãããã®ãã¼ã¸ã§ã¯ã主㫠PHP ã«ããããWeb ã¢ããªã±ã¼ã·ã§ã³ã®ã»ãã¥ãªãã£åé¡ã«ã¤ãã¦ã¾ã¨ãã¦ãã¾ãã Web ã¢ããªã±ã¼ã·ã§ã³ã®ã»ãã¥ãªãã£åé¡ã¨ãã¦ã¯ã以ä¸ã®åé¡ã«ã¤ãã¦ããåãæãããã¦ããã¨æãã¾ããããããã®ã»ãã¥ãªãã£åé¡ã«ã¤ãã¦èª¿ã¹ããã¨ããããã以å¤ã§ããPHP ã«é¢é£ãã¦ããã»ãã¥ãªãã£åé¡ã«ã¤ãã¦ç¥ã£ã¦ãããã¨ã«ã¤ãã¦ã¡ã¢ãã¦ããã¾ãã ã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã° SQL ã¤ã³ã¸ã§ã¯ã·ã§ã³ ãã¹ã»ãã©ãã¼ãµã«(ãã£ã¬ã¯ããªã»ãã©ãã¼ãµã«) ã»ãã·ã§ã³ãã¤ã¸ã£ã㯠ã³ãã³ãã¤ã³ã¸ã§ã¯ã·ã§ã³ ã¾ããPHP ããã¥ã¢ã« : ã»ãã¥ãªãã£ããPHP Security Guide (PHP Security Consortium) ã«ã¯ãPH
Google ã®ã¦ã§ããã°å ¬éãã¼ã«ã使ã£ã¦ãããã¹ããåçãåç»ãå ±æã§ãã¾ãã
ã³ã³ãã¥ã¼ã¿ãã¯ããã¨ããã¤ã³ã¿ã¼ãããã«æ¥ç¶ããé»åæ©å¨ã«ã¯ãTCP/IPã½ããã¦ã§ã¢ãçµã¿è¾¼ã¾ãã¦ãã¾ãã è¿å¹´ã§ã¯ãæ å ±å®¶é»ãæºå¸¯ç«¯æ«ãªã©ã®é»åæ©å¨ã«ã使ãããããã«ãªããTCP/IPã½ããã¦ã§ã¢ã¯åºãå©ç¨ããã¦ãã¾ãã TCP/IPãå®è£ ããã½ããã¦ã§ã¢ã¯ãããã¾ã§å¤ãã®èå¼±æ§ãçºè¦ãå ¬è¡¨ãããæ©å¨ãã¨ã«å¯¾çãå®è£ ããã¦ãã¾ãããããããããããèå¼±æ§ã®è©³ç´°ãªæ å ±ãã¨ãã¾ã¨ããè³æããªãã£ããã¨ãããæ°ãã«éçºãããã½ããã¦ã§ã¢ã§æ¢ã«å ¬è¡¨ããã¦ããèå¼±æ§ã®å¯¾çãå®è£ ããã¦ããããèå¼±æ§ããåçºãããã±ã¼ã¹ãè¦åãããã¾ãã ãã®ãããªèª²é¡ã«å¯¾å¿ãããããIPAã§ã¯ãTCP/IPã«é¢ããæ¢ç¥ã®èå¼±æ§ãåãä¸ããTCP/IPå®è£ æã®æ å ±ã»ãã¥ãªãã£å¯¾çã®åä¸ãç®æãã¦èª¿æ»ãå®æ½ãã¾ããã æ¬å ±åæ¸ã¯ãä¸è¬ã«å ¬è¡¨ããã¦ããTCP/IPã«é¢ããæ¢ç¥ã®èå¼±æ§æ å ±ãåéåæãã詳細ãªè§£èª¬æ¸ã¨ã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}