Exploit that gives remote access affects ~200 million cable modems (ars technica)
Exploit that gives remote access affects ~200 million cable modems (ars technica)
Posted Jan 16, 2020 17:12 UTC (Thu) by flussence (guest, #85566)In reply to: Exploit that gives remote access affects ~200 million cable modems (ars technica) by smurf
Parent article: Exploit that gives remote access affects ~200 million cable modems (ars technica)
Browsers have no qualms about blocking TCP ports perpetually (try http://localhost:6000/ for an instant error message), something as sketchy as cross-site connections that jump address scope boundaries should be subject to at least that level of scrutiny.
Or, we can just do nothing and have this kind of thing repeat every six months forever.
Posted Jan 16, 2020 18:10 UTC (Thu)
by excors (subscriber, #95769)
[Link]
That's why CORS has the weird shape that it does: certain cross-origin requests are permitted in browsers, because they've been possible for decades and everyone implementing an HTTP service or designing a non-HTTP protocol should have been aware of that (and, largely, have been). Also, blocking those requests now would cause compatibility problems in legitimate use cases. But CORS tries to lock down everything that wasn't previously possible, e.g. you can send a GET/POST and display the response as an image or an iframe, but you can't read the response into JavaScript (unless the response includes CORS headers to explicitly say it's okay to read), because reading the response is a newer capability (with cross-origin XMLHttpRequest) that services might reasonably have not anticipated. If a previously-secure service becomes vulnerable because of new features in a web browser, that would be the web browser's fault, so the browsers try hard to avoid that.
WebSockets aren't protected by CORS, because to any non-WebSockets protocol it looks just like an HTTP GET request (which is already permitted with no CORS restrictions), so there are no legacy services that need protecting from unanticipated messages. Any WebSockets service is responsible for its own security against unauthorised WebSockets connections, and the security rules have been obvious and constant since WebSockets was introduced, so it's not the browser's fault if the service has vulnerabilities.
Exploit that gives remote access affects ~200 million cable modems (ars technica)