[Seaside] Passing links around - a security issue?
Jens Pall
jens at axonspace.com
Wed Jan 24 18:23:48 UTC 2007
Ramon Leon wrote:
>> -----Original Message-----
>> From: seaside-bounces at lists.squeakfoundation.org
>> [mailto:seaside-bounces at lists.squeakfoundation.org] On Behalf
>> Of Jens Pall
>> Sent: Wednesday, January 24, 2007 5:49 AM
>> To: The Squeak Enterprise Aubergines Server - general discussion.
>> Subject: [Seaside] Passing links around - a security issue?
>>
>> Hi
>>
>> One thought: Is it a security issue to pass links generated
>> by Seaside to someone else? Is it possible to hijack the
>> session this way?
>>
>> Consider this:
>>
>> You log on to a seaside site.
>> You copy a link from inside the site and pass it to someone
>> else (by e-mail for example).
>> That someone else clicks on your link and has gained access
>> to your session.
>>
>> Hopefully I have this completely wrong and am just talking
>> nonsense. If not, what is the correct and safe way to pass
>> links (to internal
>> sources) to external parties?
>>
>> Thanks,
>> JP
>
> This isn't just a Seaside thing, it's an issue with any framework that
> enables cookieless sessions. As with those other frameworks, you can choose
> to keep the session id in the url, or in the cookie. Seaside is no
> different than other frameworks in this regard other than that it defaults
> to cookie less mode where most frameworks default to cookie based sessions.
>
> Ramon Leon
> http://onsmalltalk.com
>
> _______________________________________________
> Seaside mailing list
> Seaside at lists.squeakfoundation.org
> http://lists.squeakfoundation.org/cgi-bin/mailman/listinfo/seaside
>
>
Yes, of course - silly me. I was so engrossed in the specific way
Seaside encodes the url that I forgot to think about this in a more
general way. Thanks for putting me straight.
Cheers,
JP
More information about the Seaside
mailing list