Vulnerability Development mailing list archives
[Full-Disclosure] Re: a method for bypassing cookie restrictions in web browsers
From: "Michal Zalewski" <lcamtuf () ghettot org>
Date: Wed, 21 Jan 2004 18:01:01 +0200
On Mon, 19 Jan 2004, Dave McKinney wrote:
This does appear to be a known way of tracking web users without using cookies: http://sourcefrog.net/projects/meantime/
Yup, my apologies for this sort-of-false alert. The only excuse I can offer is that I failed to find any related information during a routine run of Google queries, and that the flaw is still very much alive nowadays. The problem is ineed known, both the use of ETags and Last-Modified headers to store data, and the indirect variant I described later on. The issue had been initially reported by Martin Pool here: http://cert.uni-stuttgart.de/archive/bugtraq/2000/03/msg00365.html Cheers, -- ------------------------- bash$ :(){ :|:&};: -- Michal Zalewski * [http://lcamtuf.coredump.cx] Did you know that clones never use mirrors? --------------------------- 2004-01-20 01:57 -- http://lcamtuf.coredump.cx/photo/current/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- a method for bypassing cookie restrictions in web browsers Michal Zalewski (Jan 19)
- Re: a method for bypassing cookie restrictions in web browsers Dave McKinney (Jan 19)
- Re: a method for bypassing cookie restrictions in web browsers Michal Zalewski (Jan 21)
- [Full-Disclosure] Re: a method for bypassing cookie restrictions in web browsers Michal Zalewski (Jan 21)
- <Possible follow-ups>
- Re: a method for bypassing cookie restrictions in web browsers Kevin Fu (Jan 20)
- Re: a method for bypassing cookie restrictions in web browsers Dave McKinney (Jan 19)