[Wikipedia-l] Safari browser cookie vulnerability

Brion Vibber brion at pobox.com
Fri Nov 21 16:57:22 UTC 2003


Just FYI for Mac OS X users: Safari has a bug (also present in some old 
versions of Mozilla / Netscape 6.x) which makes it possible for 
third-party sites to steal domain cookies.

Hypothetically, this could allow a site you visit (even accidentally, 
or as an inline image) to steal your temporary session cookies and your 
stored password (if you selected "remember my password") from 
Wikipedia. A stolen password cookie could be used to login to the wiki 
with your user name; hijacking a session cookie may be possible as 
well.

I've tightened up the cookie settings on all other Wikipedias so that 
if you clear any old cookies you might have from them, the new cookies 
should no longer be vulnerable to this bug (because they will be set 
only for a specific hostname, eg fr.wikipedia.org, and the technique 
doesn't work on such a cookie). However the 
en.wikipedia.org/en2.wikipedia.org setup currently requires using the 
domain cookie to share sessions between the two servers and remains 
vulnerable. (Not to mention all those other web sites out there!)

If you're using Safari, consider clearing your stored cookies and 
disabling accepting new cookies until Apple releases a fix. Mozilla 1.5 
and Camino 0.7 are not vulnerable and are very functional browsers.

-- brion vibber (brion @ pobox.com)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: PGP.sig
Type: application/pgp-signature
Size: 186 bytes
Desc: This is a digitally signed message part
Url : http://lists.wikimedia.org/pipermail/wikipedia-l/attachments/20031121/f88de856/attachment.pgp 


More information about the Wikipedia-l mailing list